May 17 00:35:11.004349 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:35:11.004379 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:35:11.004393 kernel: BIOS-provided physical RAM map: May 17 00:35:11.004403 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 17 00:35:11.004413 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved May 17 00:35:11.004423 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable May 17 00:35:11.004437 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved May 17 00:35:11.004448 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data May 17 00:35:11.004458 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS May 17 00:35:11.004469 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable May 17 00:35:11.004479 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable May 17 00:35:11.004490 kernel: printk: bootconsole [earlyser0] enabled May 17 00:35:11.004500 kernel: NX (Execute Disable) protection: active May 17 00:35:11.004511 kernel: efi: EFI v2.70 by Microsoft May 17 00:35:11.004527 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 May 17 00:35:11.004538 kernel: random: crng init done May 17 00:35:11.004549 kernel: SMBIOS 3.1.0 present. May 17 00:35:11.004561 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 May 17 00:35:11.004572 kernel: Hypervisor detected: Microsoft Hyper-V May 17 00:35:11.004584 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 May 17 00:35:11.004595 kernel: Hyper-V Host Build:20348-10.0-1-0.1827 May 17 00:35:11.004606 kernel: Hyper-V: Nested features: 0x1e0101 May 17 00:35:11.004620 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 May 17 00:35:11.004631 kernel: Hyper-V: Using hypercall for remote TLB flush May 17 00:35:11.004642 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns May 17 00:35:11.004654 kernel: tsc: Marking TSC unstable due to running on Hyper-V May 17 00:35:11.004665 kernel: tsc: Detected 2593.905 MHz processor May 17 00:35:11.004677 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:35:11.004689 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:35:11.004700 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 May 17 00:35:11.004712 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:35:11.004723 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved May 17 00:35:11.004737 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 May 17 00:35:11.004748 kernel: Using GB pages for direct mapping May 17 00:35:11.004760 kernel: Secure boot disabled May 17 00:35:11.004783 kernel: ACPI: Early table checksum verification disabled May 17 00:35:11.004795 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) May 17 00:35:11.004806 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:11.004818 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:11.004830 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) May 17 00:35:11.004848 kernel: ACPI: FACS 0x000000003FFFE000 000040 May 17 00:35:11.004861 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:11.004873 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:11.004885 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:11.004898 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:11.004910 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:11.004925 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:11.004937 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:11.004950 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] May 17 00:35:11.004962 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] May 17 00:35:11.004974 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] May 17 00:35:11.004987 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] May 17 00:35:11.004999 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] May 17 00:35:11.005011 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] May 17 00:35:11.005026 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] May 17 00:35:11.005038 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] May 17 00:35:11.005051 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] May 17 00:35:11.005063 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] May 17 00:35:11.005075 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 17 00:35:11.005087 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 17 00:35:11.005099 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug May 17 00:35:11.005112 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug May 17 00:35:11.005124 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug May 17 00:35:11.005139 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug May 17 00:35:11.005151 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug May 17 00:35:11.005164 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug May 17 00:35:11.005176 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug May 17 00:35:11.005188 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug May 17 00:35:11.005201 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug May 17 00:35:11.005213 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug May 17 00:35:11.005225 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug May 17 00:35:11.005237 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug May 17 00:35:11.005252 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug May 17 00:35:11.005264 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug May 17 00:35:11.005277 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug May 17 00:35:11.005289 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug May 17 00:35:11.005301 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] May 17 00:35:11.005314 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] May 17 00:35:11.005326 kernel: Zone ranges: May 17 00:35:11.005338 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:35:11.005351 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 17 00:35:11.005365 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] May 17 00:35:11.005378 kernel: Movable zone start for each node May 17 00:35:11.005390 kernel: Early memory node ranges May 17 00:35:11.005402 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 17 00:35:11.005414 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] May 17 00:35:11.005427 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] May 17 00:35:11.005439 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] May 17 00:35:11.005451 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] May 17 00:35:11.005463 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:35:11.005478 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 17 00:35:11.005490 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges May 17 00:35:11.005502 kernel: ACPI: PM-Timer IO Port: 0x408 May 17 00:35:11.005514 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) May 17 00:35:11.005527 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 May 17 00:35:11.005539 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 17 00:35:11.005552 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:35:11.005564 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 May 17 00:35:11.005576 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 17 00:35:11.005591 kernel: [mem 0x40000000-0xffffffff] available for PCI devices May 17 00:35:11.005603 kernel: Booting paravirtualized kernel on Hyper-V May 17 00:35:11.005616 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:35:11.005628 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 17 00:35:11.005641 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 17 00:35:11.005653 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 17 00:35:11.005665 kernel: pcpu-alloc: [0] 0 1 May 17 00:35:11.005677 kernel: Hyper-V: PV spinlocks enabled May 17 00:35:11.005689 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 17 00:35:11.005703 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 May 17 00:35:11.011851 kernel: Policy zone: Normal May 17 00:35:11.011869 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:35:11.011883 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:35:11.011896 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) May 17 00:35:11.011908 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 17 00:35:11.011921 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:35:11.011933 kernel: Memory: 8079144K/8387460K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 308056K reserved, 0K cma-reserved) May 17 00:35:11.011951 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 00:35:11.011964 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:35:11.011986 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:35:11.012001 kernel: rcu: Hierarchical RCU implementation. May 17 00:35:11.012015 kernel: rcu: RCU event tracing is enabled. May 17 00:35:11.012028 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 00:35:11.012042 kernel: Rude variant of Tasks RCU enabled. May 17 00:35:11.012055 kernel: Tracing variant of Tasks RCU enabled. May 17 00:35:11.012068 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:35:11.012082 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 00:35:11.012094 kernel: Using NULL legacy PIC May 17 00:35:11.012110 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 May 17 00:35:11.012123 kernel: Console: colour dummy device 80x25 May 17 00:35:11.012136 kernel: printk: console [tty1] enabled May 17 00:35:11.012149 kernel: printk: console [ttyS0] enabled May 17 00:35:11.012162 kernel: printk: bootconsole [earlyser0] disabled May 17 00:35:11.012177 kernel: ACPI: Core revision 20210730 May 17 00:35:11.012191 kernel: Failed to register legacy timer interrupt May 17 00:35:11.012204 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:35:11.012217 kernel: Hyper-V: Using IPI hypercalls May 17 00:35:11.012230 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593905) May 17 00:35:11.012243 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 17 00:35:11.012256 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 17 00:35:11.012269 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:35:11.012282 kernel: Spectre V2 : Mitigation: Retpolines May 17 00:35:11.012295 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 17 00:35:11.012310 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! May 17 00:35:11.012323 kernel: RETBleed: Vulnerable May 17 00:35:11.012336 kernel: Speculative Store Bypass: Vulnerable May 17 00:35:11.012349 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:35:11.012361 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:35:11.012374 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:35:11.012390 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:35:11.012402 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:35:11.012415 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' May 17 00:35:11.012429 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' May 17 00:35:11.012444 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' May 17 00:35:11.012457 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:35:11.012470 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 May 17 00:35:11.012485 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 May 17 00:35:11.012511 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 May 17 00:35:11.012528 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. May 17 00:35:11.012540 kernel: Freeing SMP alternatives memory: 32K May 17 00:35:11.012551 kernel: pid_max: default: 32768 minimum: 301 May 17 00:35:11.012563 kernel: LSM: Security Framework initializing May 17 00:35:11.012576 kernel: SELinux: Initializing. May 17 00:35:11.012589 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:35:11.012599 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:35:11.012615 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) May 17 00:35:11.012628 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. May 17 00:35:11.012642 kernel: signal: max sigframe size: 3632 May 17 00:35:11.012653 kernel: rcu: Hierarchical SRCU implementation. May 17 00:35:11.012665 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 17 00:35:11.012677 kernel: smp: Bringing up secondary CPUs ... May 17 00:35:11.012689 kernel: x86: Booting SMP configuration: May 17 00:35:11.012708 kernel: .... node #0, CPUs: #1 May 17 00:35:11.012721 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. May 17 00:35:11.012738 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 17 00:35:11.012751 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:35:11.012765 kernel: smpboot: Max logical packages: 1 May 17 00:35:11.012800 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) May 17 00:35:11.012815 kernel: devtmpfs: initialized May 17 00:35:11.012828 kernel: x86/mm: Memory block size: 128MB May 17 00:35:11.012840 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) May 17 00:35:11.012854 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:35:11.012866 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 00:35:11.012883 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:35:11.012897 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:35:11.012910 kernel: audit: initializing netlink subsys (disabled) May 17 00:35:11.012924 kernel: audit: type=2000 audit(1747442110.023:1): state=initialized audit_enabled=0 res=1 May 17 00:35:11.012936 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:35:11.012949 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:35:11.012962 kernel: cpuidle: using governor menu May 17 00:35:11.012975 kernel: ACPI: bus type PCI registered May 17 00:35:11.012987 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:35:11.013002 kernel: dca service started, version 1.12.1 May 17 00:35:11.013015 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:35:11.013028 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:35:11.013043 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:35:11.013057 kernel: ACPI: Added _OSI(Module Device) May 17 00:35:11.013068 kernel: ACPI: Added _OSI(Processor Device) May 17 00:35:11.013081 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:35:11.013098 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:35:11.013114 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:35:11.013129 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:35:11.013141 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:35:11.013154 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 17 00:35:11.013167 kernel: ACPI: Interpreter enabled May 17 00:35:11.013180 kernel: ACPI: PM: (supports S0 S5) May 17 00:35:11.013192 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:35:11.013206 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:35:11.013220 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F May 17 00:35:11.013234 kernel: iommu: Default domain type: Translated May 17 00:35:11.013249 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:35:11.013261 kernel: vgaarb: loaded May 17 00:35:11.013273 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:35:11.013287 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:35:11.013300 kernel: PTP clock support registered May 17 00:35:11.013313 kernel: Registered efivars operations May 17 00:35:11.013325 kernel: PCI: Using ACPI for IRQ routing May 17 00:35:11.013337 kernel: PCI: System does not support PCI May 17 00:35:11.013349 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page May 17 00:35:11.013365 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:35:11.013377 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:35:11.013390 kernel: pnp: PnP ACPI init May 17 00:35:11.013402 kernel: pnp: PnP ACPI: found 3 devices May 17 00:35:11.013416 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:35:11.013429 kernel: NET: Registered PF_INET protocol family May 17 00:35:11.013441 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 17 00:35:11.013454 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) May 17 00:35:11.013468 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:35:11.013486 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) May 17 00:35:11.013500 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) May 17 00:35:11.013515 kernel: TCP: Hash tables configured (established 65536 bind 65536) May 17 00:35:11.013530 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) May 17 00:35:11.013544 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) May 17 00:35:11.013558 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:35:11.013572 kernel: NET: Registered PF_XDP protocol family May 17 00:35:11.013585 kernel: PCI: CLS 0 bytes, default 64 May 17 00:35:11.013598 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 17 00:35:11.013616 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) May 17 00:35:11.013630 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 17 00:35:11.013644 kernel: Initialise system trusted keyrings May 17 00:35:11.013657 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 May 17 00:35:11.013671 kernel: Key type asymmetric registered May 17 00:35:11.013684 kernel: Asymmetric key parser 'x509' registered May 17 00:35:11.013697 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:35:11.013711 kernel: io scheduler mq-deadline registered May 17 00:35:11.013725 kernel: io scheduler kyber registered May 17 00:35:11.013741 kernel: io scheduler bfq registered May 17 00:35:11.013754 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:35:11.013768 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:35:11.015821 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:35:11.015836 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A May 17 00:35:11.015850 kernel: i8042: PNP: No PS/2 controller found. May 17 00:35:11.016006 kernel: rtc_cmos 00:02: registered as rtc0 May 17 00:35:11.016118 kernel: rtc_cmos 00:02: setting system clock to 2025-05-17T00:35:10 UTC (1747442110) May 17 00:35:11.016227 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram May 17 00:35:11.016245 kernel: intel_pstate: CPU model not supported May 17 00:35:11.016259 kernel: efifb: probing for efifb May 17 00:35:11.016273 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k May 17 00:35:11.016286 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 May 17 00:35:11.016300 kernel: efifb: scrolling: redraw May 17 00:35:11.016313 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 17 00:35:11.016327 kernel: Console: switching to colour frame buffer device 128x48 May 17 00:35:11.016342 kernel: fb0: EFI VGA frame buffer device May 17 00:35:11.016355 kernel: pstore: Registered efi as persistent store backend May 17 00:35:11.016367 kernel: NET: Registered PF_INET6 protocol family May 17 00:35:11.016380 kernel: Segment Routing with IPv6 May 17 00:35:11.016394 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:35:11.016407 kernel: NET: Registered PF_PACKET protocol family May 17 00:35:11.016420 kernel: Key type dns_resolver registered May 17 00:35:11.016433 kernel: IPI shorthand broadcast: enabled May 17 00:35:11.016445 kernel: sched_clock: Marking stable (688773500, 19312500)->(864996900, -156910900) May 17 00:35:11.016460 kernel: registered taskstats version 1 May 17 00:35:11.016478 kernel: Loading compiled-in X.509 certificates May 17 00:35:11.016491 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:35:11.016503 kernel: Key type .fscrypt registered May 17 00:35:11.016516 kernel: Key type fscrypt-provisioning registered May 17 00:35:11.016530 kernel: pstore: Using crash dump compression: deflate May 17 00:35:11.016543 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:35:11.016556 kernel: ima: Allocated hash algorithm: sha1 May 17 00:35:11.016569 kernel: ima: No architecture policies found May 17 00:35:11.016585 kernel: clk: Disabling unused clocks May 17 00:35:11.016598 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:35:11.016611 kernel: Write protecting the kernel read-only data: 28672k May 17 00:35:11.016623 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:35:11.016636 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:35:11.016650 kernel: Run /init as init process May 17 00:35:11.016662 kernel: with arguments: May 17 00:35:11.016675 kernel: /init May 17 00:35:11.016688 kernel: with environment: May 17 00:35:11.016702 kernel: HOME=/ May 17 00:35:11.016715 kernel: TERM=linux May 17 00:35:11.016727 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:35:11.016743 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:35:11.016759 systemd[1]: Detected virtualization microsoft. May 17 00:35:11.016787 systemd[1]: Detected architecture x86-64. May 17 00:35:11.016805 systemd[1]: Running in initrd. May 17 00:35:11.016818 systemd[1]: No hostname configured, using default hostname. May 17 00:35:11.016835 systemd[1]: Hostname set to . May 17 00:35:11.016849 systemd[1]: Initializing machine ID from random generator. May 17 00:35:11.016862 systemd[1]: Queued start job for default target initrd.target. May 17 00:35:11.016876 systemd[1]: Started systemd-ask-password-console.path. May 17 00:35:11.016890 systemd[1]: Reached target cryptsetup.target. May 17 00:35:11.016903 systemd[1]: Reached target paths.target. May 17 00:35:11.016917 systemd[1]: Reached target slices.target. May 17 00:35:11.016930 systemd[1]: Reached target swap.target. May 17 00:35:11.016946 systemd[1]: Reached target timers.target. May 17 00:35:11.016961 systemd[1]: Listening on iscsid.socket. May 17 00:35:11.016975 systemd[1]: Listening on iscsiuio.socket. May 17 00:35:11.016989 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:35:11.017003 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:35:11.017017 systemd[1]: Listening on systemd-journald.socket. May 17 00:35:11.017031 systemd[1]: Listening on systemd-networkd.socket. May 17 00:35:11.017045 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:35:11.017061 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:35:11.017075 systemd[1]: Reached target sockets.target. May 17 00:35:11.017089 systemd[1]: Starting kmod-static-nodes.service... May 17 00:35:11.017103 systemd[1]: Finished network-cleanup.service. May 17 00:35:11.017117 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:35:11.017131 systemd[1]: Starting systemd-journald.service... May 17 00:35:11.017145 systemd[1]: Starting systemd-modules-load.service... May 17 00:35:11.017159 systemd[1]: Starting systemd-resolved.service... May 17 00:35:11.017173 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:35:11.017193 systemd-journald[183]: Journal started May 17 00:35:11.017260 systemd-journald[183]: Runtime Journal (/run/log/journal/c2b1e562034e427ea88c79c88b90837d) is 8.0M, max 159.0M, 151.0M free. May 17 00:35:11.018411 systemd-modules-load[184]: Inserted module 'overlay' May 17 00:35:11.028209 systemd[1]: Started systemd-journald.service. May 17 00:35:11.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.044693 kernel: audit: type=1130 audit(1747442111.031:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.032939 systemd[1]: Finished kmod-static-nodes.service. May 17 00:35:11.044884 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:35:11.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.056684 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:35:11.075017 kernel: audit: type=1130 audit(1747442111.043:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.068337 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:35:11.069262 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:35:11.083711 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:35:11.096792 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:35:11.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.098663 systemd-resolved[185]: Positive Trust Anchors: May 17 00:35:11.109959 kernel: audit: type=1130 audit(1747442111.055:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.098835 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:35:11.131517 kernel: audit: type=1130 audit(1747442111.067:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.131544 kernel: audit: type=1130 audit(1747442111.085:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.098872 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:35:11.101631 systemd-resolved[185]: Defaulting to hostname 'linux'. May 17 00:35:11.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.102499 systemd[1]: Started systemd-resolved.service. May 17 00:35:11.159891 kernel: audit: type=1130 audit(1747442111.144:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.155167 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:35:11.168549 kernel: Bridge firewalling registered May 17 00:35:11.160136 systemd[1]: Reached target nss-lookup.target. May 17 00:35:11.163365 systemd-modules-load[184]: Inserted module 'br_netfilter' May 17 00:35:11.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.164621 systemd[1]: Starting dracut-cmdline.service... May 17 00:35:11.186715 kernel: audit: type=1130 audit(1747442111.159:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.186740 dracut-cmdline[201]: dracut-dracut-053 May 17 00:35:11.186740 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:35:11.224788 kernel: SCSI subsystem initialized May 17 00:35:11.248544 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:35:11.248587 kernel: device-mapper: uevent: version 1.0.3 May 17 00:35:11.254784 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:35:11.260785 kernel: Loading iSCSI transport class v2.0-870. May 17 00:35:11.258376 systemd-modules-load[184]: Inserted module 'dm_multipath' May 17 00:35:11.259137 systemd[1]: Finished systemd-modules-load.service. May 17 00:35:11.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.273786 kernel: audit: type=1130 audit(1747442111.262:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.273869 systemd[1]: Starting systemd-sysctl.service... May 17 00:35:11.287447 systemd[1]: Finished systemd-sysctl.service. May 17 00:35:11.302480 kernel: audit: type=1130 audit(1747442111.288:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.307793 kernel: iscsi: registered transport (tcp) May 17 00:35:11.333917 kernel: iscsi: registered transport (qla4xxx) May 17 00:35:11.333972 kernel: QLogic iSCSI HBA Driver May 17 00:35:11.363511 systemd[1]: Finished dracut-cmdline.service. May 17 00:35:11.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.366725 systemd[1]: Starting dracut-pre-udev.service... May 17 00:35:11.417793 kernel: raid6: avx512x4 gen() 18432 MB/s May 17 00:35:11.436785 kernel: raid6: avx512x4 xor() 8534 MB/s May 17 00:35:11.455785 kernel: raid6: avx512x2 gen() 18512 MB/s May 17 00:35:11.475788 kernel: raid6: avx512x2 xor() 29753 MB/s May 17 00:35:11.494779 kernel: raid6: avx512x1 gen() 18426 MB/s May 17 00:35:11.514784 kernel: raid6: avx512x1 xor() 26850 MB/s May 17 00:35:11.534786 kernel: raid6: avx2x4 gen() 18439 MB/s May 17 00:35:11.554782 kernel: raid6: avx2x4 xor() 8002 MB/s May 17 00:35:11.574782 kernel: raid6: avx2x2 gen() 18427 MB/s May 17 00:35:11.594788 kernel: raid6: avx2x2 xor() 22209 MB/s May 17 00:35:11.613799 kernel: raid6: avx2x1 gen() 14009 MB/s May 17 00:35:11.632789 kernel: raid6: avx2x1 xor() 19239 MB/s May 17 00:35:11.653780 kernel: raid6: sse2x4 gen() 11627 MB/s May 17 00:35:11.673782 kernel: raid6: sse2x4 xor() 7404 MB/s May 17 00:35:11.692781 kernel: raid6: sse2x2 gen() 12855 MB/s May 17 00:35:11.712787 kernel: raid6: sse2x2 xor() 7667 MB/s May 17 00:35:11.731781 kernel: raid6: sse2x1 gen() 11648 MB/s May 17 00:35:11.754066 kernel: raid6: sse2x1 xor() 5927 MB/s May 17 00:35:11.754087 kernel: raid6: using algorithm avx512x2 gen() 18512 MB/s May 17 00:35:11.754100 kernel: raid6: .... xor() 29753 MB/s, rmw enabled May 17 00:35:11.757062 kernel: raid6: using avx512x2 recovery algorithm May 17 00:35:11.775788 kernel: xor: automatically using best checksumming function avx May 17 00:35:11.870795 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:35:11.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.880000 audit: BPF prog-id=7 op=LOAD May 17 00:35:11.880000 audit: BPF prog-id=8 op=LOAD May 17 00:35:11.879171 systemd[1]: Finished dracut-pre-udev.service. May 17 00:35:11.883935 systemd[1]: Starting systemd-udevd.service... May 17 00:35:11.896837 systemd-udevd[384]: Using default interface naming scheme 'v252'. May 17 00:35:11.901498 systemd[1]: Started systemd-udevd.service. May 17 00:35:11.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.914624 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:35:11.927938 dracut-pre-trigger[405]: rd.md=0: removing MD RAID activation May 17 00:35:11.957888 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:35:11.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:11.958752 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:35:11.994834 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:35:11.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:12.041791 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:35:12.078173 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:35:12.078235 kernel: hv_vmbus: Vmbus version:5.2 May 17 00:35:12.078253 kernel: AES CTR mode by8 optimization enabled May 17 00:35:12.093792 kernel: hv_vmbus: registering driver hyperv_keyboard May 17 00:35:12.118189 kernel: hv_vmbus: registering driver hv_storvsc May 17 00:35:12.118245 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 May 17 00:35:12.124900 kernel: scsi host0: storvsc_host_t May 17 00:35:12.125087 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 May 17 00:35:12.132923 kernel: scsi host1: storvsc_host_t May 17 00:35:12.132979 kernel: hid: raw HID events driver (C) Jiri Kosina May 17 00:35:12.142790 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 May 17 00:35:12.142846 kernel: hv_vmbus: registering driver hv_netvsc May 17 00:35:12.160793 kernel: hv_vmbus: registering driver hid_hyperv May 17 00:35:12.171801 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 May 17 00:35:12.171851 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on May 17 00:35:12.194602 kernel: sr 0:0:0:2: [sr0] scsi-1 drive May 17 00:35:12.203913 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 17 00:35:12.203935 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) May 17 00:35:12.221974 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks May 17 00:35:12.222090 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 May 17 00:35:12.222193 kernel: sd 0:0:0:0: [sda] Write Protect is off May 17 00:35:12.222290 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 May 17 00:35:12.222390 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA May 17 00:35:12.222486 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:35:12.222497 kernel: sd 0:0:0:0: [sda] Attached SCSI disk May 17 00:35:12.333793 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (447) May 17 00:35:12.345793 kernel: hv_netvsc 6045bdd1-e803-6045-bdd1-e8036045bdd1 eth0: VF slot 1 added May 17 00:35:12.352124 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:35:12.362094 kernel: hv_vmbus: registering driver hv_pci May 17 00:35:12.370802 kernel: hv_pci 41a5b4b9-0c94-4ebf-a31f-5c2cb813dd73: PCI VMBus probing: Using version 0x10004 May 17 00:35:12.458542 kernel: hv_pci 41a5b4b9-0c94-4ebf-a31f-5c2cb813dd73: PCI host bridge to bus 0c94:00 May 17 00:35:12.458682 kernel: pci_bus 0c94:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] May 17 00:35:12.458827 kernel: pci_bus 0c94:00: No busn resource found for root bus, will use [bus 00-ff] May 17 00:35:12.458937 kernel: pci 0c94:00:02.0: [15b3:1016] type 00 class 0x020000 May 17 00:35:12.459069 kernel: pci 0c94:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] May 17 00:35:12.459198 kernel: pci 0c94:00:02.0: enabling Extended Tags May 17 00:35:12.459315 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:35:12.459326 kernel: pci 0c94:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 0c94:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) May 17 00:35:12.459444 kernel: pci_bus 0c94:00: busn_res: [bus 00-ff] end is updated to 00 May 17 00:35:12.459544 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:35:12.459554 kernel: pci 0c94:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] May 17 00:35:12.375737 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:35:12.404804 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:35:12.407369 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:35:12.418631 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:35:12.426386 systemd[1]: Starting disk-uuid.service... May 17 00:35:12.641794 kernel: mlx5_core 0c94:00:02.0: firmware version: 14.30.5000 May 17 00:35:12.892507 kernel: mlx5_core 0c94:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) May 17 00:35:12.892701 kernel: mlx5_core 0c94:00:02.0: Supported tc offload range - chains: 1, prios: 1 May 17 00:35:12.892875 kernel: mlx5_core 0c94:00:02.0: mlx5e_tc_post_act_init:40:(pid 7): firmware level support is missing May 17 00:35:12.892999 kernel: hv_netvsc 6045bdd1-e803-6045-bdd1-e8036045bdd1 eth0: VF registering: eth1 May 17 00:35:12.893097 kernel: mlx5_core 0c94:00:02.0 eth1: joined to eth0 May 17 00:35:12.899792 kernel: mlx5_core 0c94:00:02.0 enP3220s1: renamed from eth1 May 17 00:35:13.452797 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:35:13.453460 disk-uuid[556]: The operation has completed successfully. May 17 00:35:13.523442 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:35:13.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:13.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:13.523543 systemd[1]: Finished disk-uuid.service. May 17 00:35:13.534794 systemd[1]: Starting verity-setup.service... May 17 00:35:13.556792 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 17 00:35:13.643892 systemd[1]: Found device dev-mapper-usr.device. May 17 00:35:13.649973 systemd[1]: Mounting sysusr-usr.mount... May 17 00:35:13.654064 systemd[1]: Finished verity-setup.service. May 17 00:35:13.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:13.725794 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:35:13.726404 systemd[1]: Mounted sysusr-usr.mount. May 17 00:35:13.729858 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:35:13.733714 systemd[1]: Starting ignition-setup.service... May 17 00:35:13.736402 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:35:13.751250 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:35:13.751293 kernel: BTRFS info (device sda6): using free space tree May 17 00:35:13.751307 kernel: BTRFS info (device sda6): has skinny extents May 17 00:35:13.792900 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:35:13.809901 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:35:13.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:13.813000 audit: BPF prog-id=9 op=LOAD May 17 00:35:13.814453 systemd[1]: Starting systemd-networkd.service... May 17 00:35:13.837357 systemd-networkd[812]: lo: Link UP May 17 00:35:13.838051 systemd-networkd[812]: lo: Gained carrier May 17 00:35:13.839548 systemd-networkd[812]: Enumeration completed May 17 00:35:13.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:13.839621 systemd[1]: Started systemd-networkd.service. May 17 00:35:13.842274 systemd-networkd[812]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:35:13.842913 systemd[1]: Reached target network.target. May 17 00:35:13.848209 systemd[1]: Starting iscsiuio.service... May 17 00:35:13.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:13.856308 systemd[1]: Started iscsiuio.service. May 17 00:35:13.860349 systemd[1]: Starting iscsid.service... May 17 00:35:13.865825 iscsid[817]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:35:13.865825 iscsid[817]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:35:13.865825 iscsid[817]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:35:13.865825 iscsid[817]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:35:13.885006 iscsid[817]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:35:13.885006 iscsid[817]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:35:13.890745 systemd[1]: Started iscsid.service. May 17 00:35:13.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:13.894790 systemd[1]: Starting dracut-initqueue.service... May 17 00:35:13.899461 systemd[1]: Finished ignition-setup.service. May 17 00:35:13.903044 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:35:13.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:13.910049 systemd[1]: Finished dracut-initqueue.service. May 17 00:35:13.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:13.916583 systemd[1]: Reached target remote-fs-pre.target. May 17 00:35:13.924390 kernel: mlx5_core 0c94:00:02.0 enP3220s1: Link up May 17 00:35:13.916739 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:35:13.917112 systemd[1]: Reached target remote-fs.target. May 17 00:35:13.922685 systemd[1]: Starting dracut-pre-mount.service... May 17 00:35:13.932922 systemd[1]: Finished dracut-pre-mount.service. May 17 00:35:13.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:13.960784 kernel: hv_netvsc 6045bdd1-e803-6045-bdd1-e8036045bdd1 eth0: Data path switched to VF: enP3220s1 May 17 00:35:13.961008 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:35:13.961576 systemd-networkd[812]: enP3220s1: Link UP May 17 00:35:13.961820 systemd-networkd[812]: eth0: Link UP May 17 00:35:13.961971 systemd-networkd[812]: eth0: Gained carrier May 17 00:35:13.970946 systemd-networkd[812]: enP3220s1: Gained carrier May 17 00:35:14.006845 systemd-networkd[812]: eth0: DHCPv4 address 10.200.4.20/24, gateway 10.200.4.1 acquired from 168.63.129.16 May 17 00:35:14.806472 ignition[822]: Ignition 2.14.0 May 17 00:35:14.806486 ignition[822]: Stage: fetch-offline May 17 00:35:14.806560 ignition[822]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:14.806615 ignition[822]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:35:14.841524 ignition[822]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:35:14.841755 ignition[822]: parsed url from cmdline: "" May 17 00:35:14.844305 ignition[822]: no config URL provided May 17 00:35:14.844316 ignition[822]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:35:14.844332 ignition[822]: no config at "/usr/lib/ignition/user.ign" May 17 00:35:14.844341 ignition[822]: failed to fetch config: resource requires networking May 17 00:35:14.846127 ignition[822]: Ignition finished successfully May 17 00:35:14.855321 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:35:14.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:14.858379 systemd[1]: Starting ignition-fetch.service... May 17 00:35:14.869759 ignition[838]: Ignition 2.14.0 May 17 00:35:14.869776 ignition[838]: Stage: fetch May 17 00:35:14.869921 ignition[838]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:14.869954 ignition[838]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:35:14.879723 ignition[838]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:35:14.882543 ignition[838]: parsed url from cmdline: "" May 17 00:35:14.882552 ignition[838]: no config URL provided May 17 00:35:14.882560 ignition[838]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:35:14.882572 ignition[838]: no config at "/usr/lib/ignition/user.ign" May 17 00:35:14.882611 ignition[838]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 May 17 00:35:14.969764 ignition[838]: GET result: OK May 17 00:35:14.969883 ignition[838]: config has been read from IMDS userdata May 17 00:35:14.969925 ignition[838]: parsing config with SHA512: 3b730e34f22de85391b0c7a18d984fd9712658afd0f5936534b0237024bcbeea3665fe9b64563c9b44cc01e983a4679106ea1e0755237e7e5c775db716dcd27c May 17 00:35:14.974396 unknown[838]: fetched base config from "system" May 17 00:35:14.974407 unknown[838]: fetched base config from "system" May 17 00:35:14.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:14.975589 ignition[838]: fetch: fetch complete May 17 00:35:14.974414 unknown[838]: fetched user config from "azure" May 17 00:35:14.975596 ignition[838]: fetch: fetch passed May 17 00:35:14.977081 systemd[1]: Finished ignition-fetch.service. May 17 00:35:14.975662 ignition[838]: Ignition finished successfully May 17 00:35:14.981858 systemd[1]: Starting ignition-kargs.service... May 17 00:35:14.993991 ignition[844]: Ignition 2.14.0 May 17 00:35:14.994003 ignition[844]: Stage: kargs May 17 00:35:14.994146 ignition[844]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:14.994178 ignition[844]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:35:15.001094 ignition[844]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:35:15.002355 ignition[844]: kargs: kargs passed May 17 00:35:15.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.003948 systemd[1]: Finished ignition-kargs.service. May 17 00:35:15.002397 ignition[844]: Ignition finished successfully May 17 00:35:15.011380 systemd[1]: Starting ignition-disks.service... May 17 00:35:15.019061 ignition[850]: Ignition 2.14.0 May 17 00:35:15.019071 ignition[850]: Stage: disks May 17 00:35:15.019200 ignition[850]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:15.019232 ignition[850]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:35:15.027796 ignition[850]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:35:15.029040 ignition[850]: disks: disks passed May 17 00:35:15.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.029796 systemd[1]: Finished ignition-disks.service. May 17 00:35:15.029086 ignition[850]: Ignition finished successfully May 17 00:35:15.032281 systemd[1]: Reached target initrd-root-device.target. May 17 00:35:15.035627 systemd[1]: Reached target local-fs-pre.target. May 17 00:35:15.037470 systemd[1]: Reached target local-fs.target. May 17 00:35:15.039234 systemd[1]: Reached target sysinit.target. May 17 00:35:15.040887 systemd[1]: Reached target basic.target. May 17 00:35:15.043690 systemd[1]: Starting systemd-fsck-root.service... May 17 00:35:15.076155 systemd-fsck[858]: ROOT: clean, 619/7326000 files, 481079/7359488 blocks May 17 00:35:15.081041 systemd[1]: Finished systemd-fsck-root.service. May 17 00:35:15.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.084198 systemd[1]: Mounting sysroot.mount... May 17 00:35:15.100796 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:35:15.100989 systemd[1]: Mounted sysroot.mount. May 17 00:35:15.104177 systemd[1]: Reached target initrd-root-fs.target. May 17 00:35:15.116544 systemd[1]: Mounting sysroot-usr.mount... May 17 00:35:15.121405 systemd[1]: Starting flatcar-metadata-hostname.service... May 17 00:35:15.125517 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:35:15.125562 systemd[1]: Reached target ignition-diskful.target. May 17 00:35:15.134005 systemd[1]: Mounted sysroot-usr.mount. May 17 00:35:15.151505 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:35:15.157097 systemd[1]: Starting initrd-setup-root.service... May 17 00:35:15.166803 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (868) May 17 00:35:15.166850 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:35:15.170947 initrd-setup-root[873]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:35:15.177370 kernel: BTRFS info (device sda6): using free space tree May 17 00:35:15.177394 kernel: BTRFS info (device sda6): has skinny extents May 17 00:35:15.183878 initrd-setup-root[897]: cut: /sysroot/etc/group: No such file or directory May 17 00:35:15.190352 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:35:15.202104 initrd-setup-root[907]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:35:15.208397 initrd-setup-root[915]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:35:15.235884 systemd-networkd[812]: eth0: Gained IPv6LL May 17 00:35:15.404935 systemd[1]: Finished initrd-setup-root.service. May 17 00:35:15.417571 kernel: kauditd_printk_skb: 23 callbacks suppressed May 17 00:35:15.417609 kernel: audit: type=1130 audit(1747442115.408:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.409722 systemd[1]: Starting ignition-mount.service... May 17 00:35:15.425863 systemd[1]: Starting sysroot-boot.service... May 17 00:35:15.430358 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 17 00:35:15.430479 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 17 00:35:15.449627 ignition[935]: INFO : Ignition 2.14.0 May 17 00:35:15.452497 ignition[935]: INFO : Stage: mount May 17 00:35:15.454620 ignition[935]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:15.457839 ignition[935]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:35:15.466317 ignition[935]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:35:15.466798 systemd[1]: Finished sysroot-boot.service. May 17 00:35:15.484312 kernel: audit: type=1130 audit(1747442115.470:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.486271 ignition[935]: INFO : mount: mount passed May 17 00:35:15.488188 ignition[935]: INFO : Ignition finished successfully May 17 00:35:15.490624 systemd[1]: Finished ignition-mount.service. May 17 00:35:15.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.505792 kernel: audit: type=1130 audit(1747442115.493:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.625345 coreos-metadata[867]: May 17 00:35:15.625 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 May 17 00:35:15.635655 coreos-metadata[867]: May 17 00:35:15.635 INFO Fetch successful May 17 00:35:15.668563 coreos-metadata[867]: May 17 00:35:15.668 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 May 17 00:35:15.682868 coreos-metadata[867]: May 17 00:35:15.682 INFO Fetch successful May 17 00:35:15.687847 coreos-metadata[867]: May 17 00:35:15.687 INFO wrote hostname ci-3510.3.7-n-cef16a74b5 to /sysroot/etc/hostname May 17 00:35:15.689658 systemd[1]: Finished flatcar-metadata-hostname.service. May 17 00:35:15.694673 systemd[1]: Starting ignition-files.service... May 17 00:35:15.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.704315 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:35:15.715884 kernel: audit: type=1130 audit(1747442115.693:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:15.721078 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (947) May 17 00:35:15.729107 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:35:15.729136 kernel: BTRFS info (device sda6): using free space tree May 17 00:35:15.729156 kernel: BTRFS info (device sda6): has skinny extents May 17 00:35:15.736399 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:35:15.748967 ignition[966]: INFO : Ignition 2.14.0 May 17 00:35:15.750918 ignition[966]: INFO : Stage: files May 17 00:35:15.750918 ignition[966]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:15.750918 ignition[966]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:35:15.760730 ignition[966]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:35:15.769826 ignition[966]: DEBUG : files: compiled without relabeling support, skipping May 17 00:35:15.772928 ignition[966]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:35:15.772928 ignition[966]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:35:15.782182 ignition[966]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:35:15.785483 ignition[966]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:35:15.788592 ignition[966]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:35:15.788592 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 17 00:35:15.788592 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 17 00:35:15.786192 unknown[966]: wrote ssh authorized keys file for user: core May 17 00:35:15.826974 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 17 00:35:15.904800 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 17 00:35:15.909593 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 17 00:35:15.909593 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:35:15.918505 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 17 00:35:15.918505 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 17 00:35:15.918505 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:35:15.918505 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:35:15.918505 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:35:15.918505 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:35:15.918505 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:35:15.918505 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:35:15.918505 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:35:15.918505 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:35:15.918505 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" May 17 00:35:15.918505 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:35:15.972983 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1030965761" May 17 00:35:15.972983 ignition[966]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1030965761": device or resource busy May 17 00:35:15.972983 ignition[966]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1030965761", trying btrfs: device or resource busy May 17 00:35:15.972983 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1030965761" May 17 00:35:15.972983 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1030965761" May 17 00:35:15.972983 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem1030965761" May 17 00:35:15.972983 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem1030965761" May 17 00:35:15.972983 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" May 17 00:35:15.972983 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:35:15.972983 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:35:15.972983 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3544429388" May 17 00:35:15.972983 ignition[966]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3544429388": device or resource busy May 17 00:35:15.972983 ignition[966]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3544429388", trying btrfs: device or resource busy May 17 00:35:15.972983 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3544429388" May 17 00:35:16.038977 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3544429388" May 17 00:35:16.038977 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem3544429388" May 17 00:35:16.038977 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem3544429388" May 17 00:35:16.038977 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:35:16.038977 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:35:16.038977 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-x86-64.raw: attempt #1 May 17 00:35:16.389248 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK May 17 00:35:16.558651 ignition[966]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:35:16.558651 ignition[966]: INFO : files: op(13): [started] processing unit "waagent.service" May 17 00:35:16.558651 ignition[966]: INFO : files: op(13): [finished] processing unit "waagent.service" May 17 00:35:16.558651 ignition[966]: INFO : files: op(14): [started] processing unit "nvidia.service" May 17 00:35:16.558651 ignition[966]: INFO : files: op(14): [finished] processing unit "nvidia.service" May 17 00:35:16.590986 kernel: audit: type=1130 audit(1747442116.568:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.591112 ignition[966]: INFO : files: op(15): [started] processing unit "prepare-helm.service" May 17 00:35:16.591112 ignition[966]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:35:16.591112 ignition[966]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:35:16.591112 ignition[966]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" May 17 00:35:16.591112 ignition[966]: INFO : files: op(17): [started] setting preset to enabled for "waagent.service" May 17 00:35:16.591112 ignition[966]: INFO : files: op(17): [finished] setting preset to enabled for "waagent.service" May 17 00:35:16.591112 ignition[966]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" May 17 00:35:16.591112 ignition[966]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" May 17 00:35:16.591112 ignition[966]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" May 17 00:35:16.591112 ignition[966]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" May 17 00:35:16.591112 ignition[966]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:35:16.591112 ignition[966]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:35:16.591112 ignition[966]: INFO : files: files passed May 17 00:35:16.591112 ignition[966]: INFO : Ignition finished successfully May 17 00:35:16.565097 systemd[1]: Finished ignition-files.service. May 17 00:35:16.569808 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:35:16.634134 initrd-setup-root-after-ignition[991]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:35:16.584875 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:35:16.588039 systemd[1]: Starting ignition-quench.service... May 17 00:35:16.649990 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:35:16.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.654902 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:35:16.670568 kernel: audit: type=1130 audit(1747442116.653:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.655001 systemd[1]: Finished ignition-quench.service. May 17 00:35:16.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.680970 systemd[1]: Reached target ignition-complete.target. May 17 00:35:16.696790 kernel: audit: type=1130 audit(1747442116.669:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.696822 kernel: audit: type=1131 audit(1747442116.669:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.697667 systemd[1]: Starting initrd-parse-etc.service... May 17 00:35:16.714715 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:35:16.716985 systemd[1]: Finished initrd-parse-etc.service. May 17 00:35:16.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.720862 systemd[1]: Reached target initrd-fs.target. May 17 00:35:16.746266 kernel: audit: type=1130 audit(1747442116.719:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.746304 kernel: audit: type=1131 audit(1747442116.719:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.742846 systemd[1]: Reached target initrd.target. May 17 00:35:16.746301 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:35:16.747173 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:35:16.762428 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:35:16.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.763260 systemd[1]: Starting initrd-cleanup.service... May 17 00:35:16.773781 systemd[1]: Stopped target nss-lookup.target. May 17 00:35:16.777897 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:35:16.781958 systemd[1]: Stopped target timers.target. May 17 00:35:16.785501 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:35:16.787699 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:35:16.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.791760 systemd[1]: Stopped target initrd.target. May 17 00:35:16.795730 systemd[1]: Stopped target basic.target. May 17 00:35:16.799346 systemd[1]: Stopped target ignition-complete.target. May 17 00:35:16.803346 systemd[1]: Stopped target ignition-diskful.target. May 17 00:35:16.807221 systemd[1]: Stopped target initrd-root-device.target. May 17 00:35:16.811663 systemd[1]: Stopped target remote-fs.target. May 17 00:35:16.815384 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:35:16.819232 systemd[1]: Stopped target sysinit.target. May 17 00:35:16.822840 systemd[1]: Stopped target local-fs.target. May 17 00:35:16.826500 systemd[1]: Stopped target local-fs-pre.target. May 17 00:35:16.830388 systemd[1]: Stopped target swap.target. May 17 00:35:16.833751 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:35:16.836064 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:35:16.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.840049 systemd[1]: Stopped target cryptsetup.target. May 17 00:35:16.843804 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:35:16.846020 systemd[1]: Stopped dracut-initqueue.service. May 17 00:35:16.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.849793 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:35:16.852390 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:35:16.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.857119 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:35:16.859312 systemd[1]: Stopped ignition-files.service. May 17 00:35:16.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.863025 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. May 17 00:35:16.865441 systemd[1]: Stopped flatcar-metadata-hostname.service. May 17 00:35:16.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.870654 systemd[1]: Stopping ignition-mount.service... May 17 00:35:16.873335 systemd[1]: Stopping iscsiuio.service... May 17 00:35:16.880310 systemd[1]: Stopping sysroot-boot.service... May 17 00:35:16.884099 ignition[1004]: INFO : Ignition 2.14.0 May 17 00:35:16.884099 ignition[1004]: INFO : Stage: umount May 17 00:35:16.884099 ignition[1004]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:16.884099 ignition[1004]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:35:16.898026 ignition[1004]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:35:16.901735 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:35:16.904489 ignition[1004]: INFO : umount: umount passed May 17 00:35:16.904489 ignition[1004]: INFO : Ignition finished successfully May 17 00:35:16.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.907028 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:35:16.907240 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:35:16.907335 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:35:16.911147 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:35:16.912056 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:35:16.912176 systemd[1]: Stopped iscsiuio.service. May 17 00:35:16.912849 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:35:16.912941 systemd[1]: Stopped ignition-mount.service. May 17 00:35:16.914260 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:35:16.914341 systemd[1]: Finished initrd-cleanup.service. May 17 00:35:16.915475 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:35:16.915520 systemd[1]: Stopped ignition-disks.service. May 17 00:35:16.916299 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:35:16.916333 systemd[1]: Stopped ignition-kargs.service. May 17 00:35:16.917144 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 00:35:16.917174 systemd[1]: Stopped ignition-fetch.service. May 17 00:35:16.917517 systemd[1]: Stopped target network.target. May 17 00:35:16.917887 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:35:16.917921 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:35:16.918267 systemd[1]: Stopped target paths.target. May 17 00:35:16.918609 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:35:16.921815 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:35:16.976931 systemd[1]: Stopped target slices.target. May 17 00:35:16.978739 systemd[1]: Stopped target sockets.target. May 17 00:35:16.982547 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:35:16.982586 systemd[1]: Closed iscsid.socket. May 17 00:35:16.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.985907 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:35:16.985952 systemd[1]: Closed iscsiuio.socket. May 17 00:35:16.989529 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:35:16.989589 systemd[1]: Stopped ignition-setup.service. May 17 00:35:16.993100 systemd[1]: Stopping systemd-networkd.service... May 17 00:35:17.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:16.996818 systemd[1]: Stopping systemd-resolved.service... May 17 00:35:17.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:17.000833 systemd-networkd[812]: eth0: DHCPv6 lease lost May 17 00:35:17.003984 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:35:17.013000 audit: BPF prog-id=9 op=UNLOAD May 17 00:35:17.004084 systemd[1]: Stopped systemd-networkd.service. May 17 00:35:17.018000 audit: BPF prog-id=6 op=UNLOAD May 17 00:35:17.008479 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:35:17.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:17.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:17.008578 systemd[1]: Stopped systemd-resolved.service. May 17 00:35:17.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:17.014585 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:35:17.014619 systemd[1]: Closed systemd-networkd.socket. May 17 00:35:17.019173 systemd[1]: Stopping network-cleanup.service... May 17 00:35:17.021816 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:35:17.021874 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:35:17.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:17.023875 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:35:17.023917 systemd[1]: Stopped systemd-sysctl.service. May 17 00:35:17.027746 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:35:17.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:17.027886 systemd[1]: Stopped systemd-modules-load.service. May 17 00:35:17.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:17.037446 systemd[1]: Stopping systemd-udevd.service... May 17 00:35:17.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:17.043103 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:35:17.045618 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:35:17.045754 systemd[1]: Stopped systemd-udevd.service. May 17 00:35:17.051632 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:35:17.051681 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:35:17.053600 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:35:17.091264 kernel: hv_netvsc 6045bdd1-e803-6045-bdd1-e8036045bdd1 eth0: Data path switched from VF: enP3220s1 May 17 00:35:17.053641 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:35:17.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:17.057230 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:35:17.057281 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:35:17.062155 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:35:17.062203 systemd[1]: Stopped dracut-cmdline.service. May 17 00:35:17.065978 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:35:17.066026 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:35:17.070446 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:35:17.083163 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 17 00:35:17.083219 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 17 00:35:17.102899 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:35:17.106644 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:35:17.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:17.118233 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:35:17.118285 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:35:17.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:17.125589 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 17 00:35:17.129250 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:35:17.131746 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:35:17.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:17.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:17.136189 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:35:17.138446 systemd[1]: Stopped network-cleanup.service. May 17 00:35:17.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:17.459783 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:35:17.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:17.459896 systemd[1]: Stopped sysroot-boot.service. May 17 00:35:17.464242 systemd[1]: Reached target initrd-switch-root.target. May 17 00:35:17.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:17.468031 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:35:17.468095 systemd[1]: Stopped initrd-setup-root.service. May 17 00:35:17.472905 systemd[1]: Starting initrd-switch-root.service... May 17 00:35:17.486348 systemd[1]: Switching root. May 17 00:35:17.513390 iscsid[817]: iscsid shutting down. May 17 00:35:17.515264 systemd-journald[183]: Received SIGTERM from PID 1 (n/a). May 17 00:35:17.515338 systemd-journald[183]: Journal stopped May 17 00:35:22.268092 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:35:22.268132 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:35:22.268157 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:35:22.268175 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:35:22.268188 kernel: SELinux: policy capability open_perms=1 May 17 00:35:22.268203 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:35:22.268223 kernel: SELinux: policy capability always_check_network=0 May 17 00:35:22.268241 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:35:22.268257 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:35:22.268271 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:35:22.268287 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:35:22.268305 systemd[1]: Successfully loaded SELinux policy in 122.972ms. May 17 00:35:22.268325 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 15.598ms. May 17 00:35:22.268346 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:35:22.268368 systemd[1]: Detected virtualization microsoft. May 17 00:35:22.268386 systemd[1]: Detected architecture x86-64. May 17 00:35:22.268402 systemd[1]: Detected first boot. May 17 00:35:22.268420 systemd[1]: Hostname set to . May 17 00:35:22.268442 systemd[1]: Initializing machine ID from random generator. May 17 00:35:22.268461 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:35:22.268478 systemd[1]: Populated /etc with preset unit settings. May 17 00:35:22.268498 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:35:22.268517 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:35:22.268537 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:35:22.268556 kernel: kauditd_printk_skb: 54 callbacks suppressed May 17 00:35:22.268572 kernel: audit: type=1334 audit(1747442121.823:91): prog-id=12 op=LOAD May 17 00:35:22.268594 kernel: audit: type=1334 audit(1747442121.823:92): prog-id=3 op=UNLOAD May 17 00:35:22.268612 kernel: audit: type=1334 audit(1747442121.827:93): prog-id=13 op=LOAD May 17 00:35:22.268629 kernel: audit: type=1334 audit(1747442121.831:94): prog-id=14 op=LOAD May 17 00:35:22.268643 kernel: audit: type=1334 audit(1747442121.831:95): prog-id=4 op=UNLOAD May 17 00:35:22.268655 kernel: audit: type=1334 audit(1747442121.831:96): prog-id=5 op=UNLOAD May 17 00:35:22.268668 kernel: audit: type=1334 audit(1747442121.835:97): prog-id=15 op=LOAD May 17 00:35:22.268681 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:35:22.268696 kernel: audit: type=1334 audit(1747442121.835:98): prog-id=12 op=UNLOAD May 17 00:35:22.268713 kernel: audit: type=1334 audit(1747442121.840:99): prog-id=16 op=LOAD May 17 00:35:22.268724 kernel: audit: type=1334 audit(1747442121.844:100): prog-id=17 op=LOAD May 17 00:35:22.268735 systemd[1]: Stopped iscsid.service. May 17 00:35:22.268748 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:35:22.268760 systemd[1]: Stopped initrd-switch-root.service. May 17 00:35:22.268803 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:35:22.268820 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:35:22.268834 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:35:22.268844 systemd[1]: Created slice system-getty.slice. May 17 00:35:22.268857 systemd[1]: Created slice system-modprobe.slice. May 17 00:35:22.268866 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:35:22.268879 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:35:22.268889 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:35:22.268901 systemd[1]: Created slice user.slice. May 17 00:35:22.268913 systemd[1]: Started systemd-ask-password-console.path. May 17 00:35:22.268923 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:35:22.268937 systemd[1]: Set up automount boot.automount. May 17 00:35:22.268947 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:35:22.268959 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:35:22.268969 systemd[1]: Stopped target initrd-fs.target. May 17 00:35:22.268982 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:35:22.268994 systemd[1]: Reached target integritysetup.target. May 17 00:35:22.269004 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:35:22.269016 systemd[1]: Reached target remote-fs.target. May 17 00:35:22.269029 systemd[1]: Reached target slices.target. May 17 00:35:22.269041 systemd[1]: Reached target swap.target. May 17 00:35:22.269052 systemd[1]: Reached target torcx.target. May 17 00:35:22.269062 systemd[1]: Reached target veritysetup.target. May 17 00:35:22.269075 systemd[1]: Listening on systemd-coredump.socket. May 17 00:35:22.269085 systemd[1]: Listening on systemd-initctl.socket. May 17 00:35:22.269100 systemd[1]: Listening on systemd-networkd.socket. May 17 00:35:22.269113 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:35:22.269125 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:35:22.269138 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:35:22.269150 systemd[1]: Mounting dev-hugepages.mount... May 17 00:35:22.269163 systemd[1]: Mounting dev-mqueue.mount... May 17 00:35:22.269173 systemd[1]: Mounting media.mount... May 17 00:35:22.269185 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:22.269200 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:35:22.269210 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:35:22.269222 systemd[1]: Mounting tmp.mount... May 17 00:35:22.269233 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:35:22.269245 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:35:22.269257 systemd[1]: Starting kmod-static-nodes.service... May 17 00:35:22.269268 systemd[1]: Starting modprobe@configfs.service... May 17 00:35:22.269280 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:35:22.269293 systemd[1]: Starting modprobe@drm.service... May 17 00:35:22.269305 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:35:22.269316 systemd[1]: Starting modprobe@fuse.service... May 17 00:35:22.269326 systemd[1]: Starting modprobe@loop.service... May 17 00:35:22.269339 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:35:22.269350 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:35:22.269362 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:35:22.269373 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:35:22.269385 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:35:22.269400 systemd[1]: Stopped systemd-journald.service. May 17 00:35:22.269410 systemd[1]: Starting systemd-journald.service... May 17 00:35:22.269423 kernel: fuse: init (API version 7.34) May 17 00:35:22.269433 kernel: loop: module loaded May 17 00:35:22.269444 systemd[1]: Starting systemd-modules-load.service... May 17 00:35:22.269458 systemd[1]: Starting systemd-network-generator.service... May 17 00:35:22.269469 systemd[1]: Starting systemd-remount-fs.service... May 17 00:35:22.269481 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:35:22.269493 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:35:22.269507 systemd[1]: Stopped verity-setup.service. May 17 00:35:22.269520 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:22.269531 systemd[1]: Mounted dev-hugepages.mount. May 17 00:35:22.269543 systemd[1]: Mounted dev-mqueue.mount. May 17 00:35:22.269553 systemd[1]: Mounted media.mount. May 17 00:35:22.269566 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:35:22.269575 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:35:22.269587 systemd[1]: Mounted tmp.mount. May 17 00:35:22.269601 systemd-journald[1148]: Journal started May 17 00:35:22.269652 systemd-journald[1148]: Runtime Journal (/run/log/journal/e4b639ac259c4b0f9c00658ee1f7371b) is 8.0M, max 159.0M, 151.0M free. May 17 00:35:18.175000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:35:18.401000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:35:18.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:35:18.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:35:18.407000 audit: BPF prog-id=10 op=LOAD May 17 00:35:18.407000 audit: BPF prog-id=10 op=UNLOAD May 17 00:35:18.407000 audit: BPF prog-id=11 op=LOAD May 17 00:35:18.407000 audit: BPF prog-id=11 op=UNLOAD May 17 00:35:18.783000 audit[1038]: AVC avc: denied { associate } for pid=1038 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:35:18.783000 audit[1038]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178c2 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=1021 pid=1038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:18.783000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:35:18.790000 audit[1038]: AVC avc: denied { associate } for pid=1038 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:35:18.790000 audit[1038]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000117999 a2=1ed a3=0 items=2 ppid=1021 pid=1038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:18.790000 audit: CWD cwd="/" May 17 00:35:18.790000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:18.790000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:18.790000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:35:21.823000 audit: BPF prog-id=12 op=LOAD May 17 00:35:21.823000 audit: BPF prog-id=3 op=UNLOAD May 17 00:35:21.827000 audit: BPF prog-id=13 op=LOAD May 17 00:35:21.831000 audit: BPF prog-id=14 op=LOAD May 17 00:35:21.831000 audit: BPF prog-id=4 op=UNLOAD May 17 00:35:21.831000 audit: BPF prog-id=5 op=UNLOAD May 17 00:35:21.835000 audit: BPF prog-id=15 op=LOAD May 17 00:35:21.835000 audit: BPF prog-id=12 op=UNLOAD May 17 00:35:21.840000 audit: BPF prog-id=16 op=LOAD May 17 00:35:21.844000 audit: BPF prog-id=17 op=LOAD May 17 00:35:21.844000 audit: BPF prog-id=13 op=UNLOAD May 17 00:35:21.844000 audit: BPF prog-id=14 op=UNLOAD May 17 00:35:21.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.876000 audit: BPF prog-id=15 op=UNLOAD May 17 00:35:21.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.181000 audit: BPF prog-id=18 op=LOAD May 17 00:35:22.182000 audit: BPF prog-id=19 op=LOAD May 17 00:35:22.182000 audit: BPF prog-id=20 op=LOAD May 17 00:35:22.182000 audit: BPF prog-id=16 op=UNLOAD May 17 00:35:22.182000 audit: BPF prog-id=17 op=UNLOAD May 17 00:35:22.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.263000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:35:22.263000 audit[1148]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffee06d1c20 a2=4000 a3=7ffee06d1cbc items=0 ppid=1 pid=1148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:22.263000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:35:21.821890 systemd[1]: Queued start job for default target multi-user.target. May 17 00:35:18.768178 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:35:22.275855 systemd[1]: Started systemd-journald.service. May 17 00:35:22.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:21.821903 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 17 00:35:18.772263 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:35:21.846103 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:35:18.772283 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:35:18.772318 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:18Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:35:18.772328 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:18Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:35:18.772368 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:18Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:35:18.772381 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:18Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:35:18.772583 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:18Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:35:22.276928 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:35:18.772623 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:35:18.772635 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:35:18.780562 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:35:18.780601 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:35:18.780621 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:35:18.780635 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:35:18.780654 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:35:18.780667 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:35:21.269389 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:21Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:35:21.269632 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:21Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:35:21.269729 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:21Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:35:21.269931 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:21Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:35:21.269983 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:21Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:35:21.270035 /usr/lib/systemd/system-generators/torcx-generator[1038]: time="2025-05-17T00:35:21Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:35:22.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.280925 systemd[1]: Finished kmod-static-nodes.service. May 17 00:35:22.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.283227 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:35:22.283544 systemd[1]: Finished modprobe@configfs.service. May 17 00:35:22.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.285733 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:35:22.285910 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:35:22.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.287995 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:35:22.288194 systemd[1]: Finished modprobe@drm.service. May 17 00:35:22.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.290179 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:35:22.290365 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:35:22.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.292442 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:35:22.292630 systemd[1]: Finished modprobe@fuse.service. May 17 00:35:22.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.294729 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:35:22.295099 systemd[1]: Finished modprobe@loop.service. May 17 00:35:22.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.297207 systemd[1]: Finished systemd-modules-load.service. May 17 00:35:22.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.299402 systemd[1]: Finished systemd-network-generator.service. May 17 00:35:22.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.302074 systemd[1]: Finished systemd-remount-fs.service. May 17 00:35:22.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.304637 systemd[1]: Reached target network-pre.target. May 17 00:35:22.308181 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:35:22.311445 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:35:22.315885 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:35:22.324150 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:35:22.327137 systemd[1]: Starting systemd-journal-flush.service... May 17 00:35:22.329302 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:35:22.330646 systemd[1]: Starting systemd-random-seed.service... May 17 00:35:22.332838 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:35:22.334164 systemd[1]: Starting systemd-sysctl.service... May 17 00:35:22.338392 systemd[1]: Starting systemd-sysusers.service... May 17 00:35:22.342227 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:35:22.347215 systemd-journald[1148]: Time spent on flushing to /var/log/journal/e4b639ac259c4b0f9c00658ee1f7371b is 34.343ms for 1140 entries. May 17 00:35:22.347215 systemd-journald[1148]: System Journal (/var/log/journal/e4b639ac259c4b0f9c00658ee1f7371b) is 8.0M, max 2.6G, 2.6G free. May 17 00:35:22.419196 systemd-journald[1148]: Received client request to flush runtime journal. May 17 00:35:22.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.347352 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:35:22.363262 systemd[1]: Finished systemd-random-seed.service. May 17 00:35:22.365750 systemd[1]: Reached target first-boot-complete.target. May 17 00:35:22.379995 systemd[1]: Finished systemd-sysctl.service. May 17 00:35:22.406459 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:35:22.409862 systemd[1]: Starting systemd-udev-settle.service... May 17 00:35:22.421861 systemd[1]: Finished systemd-journal-flush.service. May 17 00:35:22.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.424984 udevadm[1163]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 17 00:35:22.542193 systemd[1]: Finished systemd-sysusers.service. May 17 00:35:22.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.546223 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:35:22.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.641851 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:35:22.925387 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:35:22.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:22.927000 audit: BPF prog-id=21 op=LOAD May 17 00:35:22.928000 audit: BPF prog-id=22 op=LOAD May 17 00:35:22.928000 audit: BPF prog-id=7 op=UNLOAD May 17 00:35:22.928000 audit: BPF prog-id=8 op=UNLOAD May 17 00:35:22.929538 systemd[1]: Starting systemd-udevd.service... May 17 00:35:22.946873 systemd-udevd[1167]: Using default interface naming scheme 'v252'. May 17 00:35:23.003937 systemd[1]: Started systemd-udevd.service. May 17 00:35:23.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:23.012000 audit: BPF prog-id=23 op=LOAD May 17 00:35:23.013818 systemd[1]: Starting systemd-networkd.service... May 17 00:35:23.041000 audit: BPF prog-id=24 op=LOAD May 17 00:35:23.041000 audit: BPF prog-id=25 op=LOAD May 17 00:35:23.041000 audit: BPF prog-id=26 op=LOAD May 17 00:35:23.043186 systemd[1]: Starting systemd-userdbd.service... May 17 00:35:23.062194 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:35:23.111369 systemd[1]: Started systemd-userdbd.service. May 17 00:35:23.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:23.136171 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:35:23.176345 kernel: hv_vmbus: registering driver hyperv_fb May 17 00:35:23.191422 kernel: hyperv_fb: Synthvid Version major 3, minor 5 May 17 00:35:23.191538 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 May 17 00:35:23.201457 kernel: hv_utils: Registering HyperV Utility Driver May 17 00:35:23.201553 kernel: hv_vmbus: registering driver hv_utils May 17 00:35:23.201573 kernel: Console: switching to colour dummy device 80x25 May 17 00:35:23.208626 kernel: Console: switching to colour frame buffer device 128x48 May 17 00:35:23.181000 audit[1180]: AVC avc: denied { confidentiality } for pid=1180 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:35:23.247794 kernel: hv_vmbus: registering driver hv_balloon May 17 00:35:23.262271 systemd-networkd[1181]: lo: Link UP May 17 00:35:23.262287 systemd-networkd[1181]: lo: Gained carrier May 17 00:35:23.262944 systemd-networkd[1181]: Enumeration completed May 17 00:35:23.263060 systemd[1]: Started systemd-networkd.service. May 17 00:35:23.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:23.267170 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:35:23.278085 systemd-networkd[1181]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:35:23.282789 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 May 17 00:35:23.181000 audit[1180]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555ac1fda5b0 a1=f884 a2=7f8c4c4f4bc5 a3=5 items=12 ppid=1167 pid=1180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.181000 audit: CWD cwd="/" May 17 00:35:23.181000 audit: PATH item=0 name=(null) inode=235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:23.181000 audit: PATH item=1 name=(null) inode=15005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:23.181000 audit: PATH item=2 name=(null) inode=15005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:23.181000 audit: PATH item=3 name=(null) inode=15006 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:23.181000 audit: PATH item=4 name=(null) inode=15005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:23.181000 audit: PATH item=5 name=(null) inode=15007 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:23.181000 audit: PATH item=6 name=(null) inode=15005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:23.181000 audit: PATH item=7 name=(null) inode=15008 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:23.181000 audit: PATH item=8 name=(null) inode=15005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:23.181000 audit: PATH item=9 name=(null) inode=15009 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:23.181000 audit: PATH item=10 name=(null) inode=15005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:23.181000 audit: PATH item=11 name=(null) inode=15010 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:23.181000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:35:23.308262 kernel: hv_utils: Heartbeat IC version 3.0 May 17 00:35:23.308341 kernel: hv_utils: Shutdown IC version 3.2 May 17 00:35:23.308372 kernel: hv_utils: TimeSync IC version 4.0 May 17 00:35:24.407785 kernel: mlx5_core 0c94:00:02.0 enP3220s1: Link up May 17 00:35:24.427785 kernel: hv_netvsc 6045bdd1-e803-6045-bdd1-e8036045bdd1 eth0: Data path switched to VF: enP3220s1 May 17 00:35:24.432645 systemd-networkd[1181]: enP3220s1: Link UP May 17 00:35:24.433329 systemd-networkd[1181]: eth0: Link UP May 17 00:35:24.433415 systemd-networkd[1181]: eth0: Gained carrier May 17 00:35:24.439436 systemd-networkd[1181]: enP3220s1: Gained carrier May 17 00:35:24.486189 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:35:24.490673 systemd-networkd[1181]: eth0: DHCPv4 address 10.200.4.20/24, gateway 10.200.4.1 acquired from 168.63.129.16 May 17 00:35:24.536929 kernel: KVM: vmx: using Hyper-V Enlightened VMCS May 17 00:35:24.574146 systemd[1]: Finished systemd-udev-settle.service. May 17 00:35:24.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:24.577653 systemd[1]: Starting lvm2-activation-early.service... May 17 00:35:24.669843 lvm[1244]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:35:24.696315 systemd[1]: Finished lvm2-activation-early.service. May 17 00:35:24.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:24.699335 systemd[1]: Reached target cryptsetup.target. May 17 00:35:24.703173 systemd[1]: Starting lvm2-activation.service... May 17 00:35:24.707751 lvm[1245]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:35:24.727270 systemd[1]: Finished lvm2-activation.service. May 17 00:35:24.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:24.730047 systemd[1]: Reached target local-fs-pre.target. May 17 00:35:24.732457 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:35:24.732492 systemd[1]: Reached target local-fs.target. May 17 00:35:24.734904 systemd[1]: Reached target machines.target. May 17 00:35:24.738202 systemd[1]: Starting ldconfig.service... May 17 00:35:24.743537 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:35:24.743633 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:35:24.744915 systemd[1]: Starting systemd-boot-update.service... May 17 00:35:24.747790 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:35:24.751130 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:35:24.755037 systemd[1]: Starting systemd-sysext.service... May 17 00:35:24.768263 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1247 (bootctl) May 17 00:35:24.769861 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:35:25.238228 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:35:25.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.245340 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:35:25.280460 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:35:25.280718 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:35:25.298778 kernel: loop0: detected capacity change from 0 to 221472 May 17 00:35:25.345791 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:35:25.358809 kernel: loop1: detected capacity change from 0 to 221472 May 17 00:35:25.364419 (sd-sysext)[1260]: Using extensions 'kubernetes'. May 17 00:35:25.366504 (sd-sysext)[1260]: Merged extensions into '/usr'. May 17 00:35:25.383167 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:25.384728 systemd[1]: Mounting usr-share-oem.mount... May 17 00:35:25.386861 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:35:25.388427 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:35:25.394122 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:35:25.397302 systemd[1]: Starting modprobe@loop.service... May 17 00:35:25.399276 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:35:25.399488 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:35:25.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.399633 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:25.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.402962 systemd[1]: Mounted usr-share-oem.mount. May 17 00:35:25.405605 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:35:25.406153 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:35:25.408639 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:35:25.408745 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:35:25.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.411783 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:35:25.411893 systemd[1]: Finished modprobe@loop.service. May 17 00:35:25.415579 systemd[1]: Finished systemd-sysext.service. May 17 00:35:25.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.420180 systemd[1]: Starting ensure-sysext.service... May 17 00:35:25.422173 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:35:25.422244 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:35:25.423544 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:35:25.433166 systemd[1]: Reloading. May 17 00:35:25.455719 systemd-tmpfiles[1267]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:35:25.466110 systemd-tmpfiles[1267]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:35:25.472357 systemd-tmpfiles[1267]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:35:25.512507 /usr/lib/systemd/system-generators/torcx-generator[1287]: time="2025-05-17T00:35:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:35:25.514835 /usr/lib/systemd/system-generators/torcx-generator[1287]: time="2025-05-17T00:35:25Z" level=info msg="torcx already run" May 17 00:35:25.613729 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:35:25.613752 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:35:25.632584 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:35:25.693323 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:35:25.694000 audit: BPF prog-id=27 op=LOAD May 17 00:35:25.694000 audit: BPF prog-id=28 op=LOAD May 17 00:35:25.694000 audit: BPF prog-id=21 op=UNLOAD May 17 00:35:25.694000 audit: BPF prog-id=22 op=UNLOAD May 17 00:35:25.695000 audit: BPF prog-id=29 op=LOAD May 17 00:35:25.695000 audit: BPF prog-id=18 op=UNLOAD May 17 00:35:25.695000 audit: BPF prog-id=30 op=LOAD May 17 00:35:25.695000 audit: BPF prog-id=31 op=LOAD May 17 00:35:25.695000 audit: BPF prog-id=19 op=UNLOAD May 17 00:35:25.695000 audit: BPF prog-id=20 op=UNLOAD May 17 00:35:25.697000 audit: BPF prog-id=32 op=LOAD May 17 00:35:25.697000 audit: BPF prog-id=24 op=UNLOAD May 17 00:35:25.697000 audit: BPF prog-id=33 op=LOAD May 17 00:35:25.697000 audit: BPF prog-id=34 op=LOAD May 17 00:35:25.697000 audit: BPF prog-id=25 op=UNLOAD May 17 00:35:25.697000 audit: BPF prog-id=26 op=UNLOAD May 17 00:35:25.698000 audit: BPF prog-id=35 op=LOAD May 17 00:35:25.698000 audit: BPF prog-id=23 op=UNLOAD May 17 00:35:25.705069 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:35:25.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.717531 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:25.717852 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:35:25.719328 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:35:25.722695 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:35:25.725871 systemd[1]: Starting modprobe@loop.service... May 17 00:35:25.727750 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:35:25.727950 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:35:25.728094 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:25.728902 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:35:25.729058 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:35:25.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.731527 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:35:25.731673 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:35:25.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.734256 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:35:25.734398 systemd[1]: Finished modprobe@loop.service. May 17 00:35:25.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.738170 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:25.738476 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:35:25.740122 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:35:25.743109 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:35:25.746430 systemd[1]: Starting modprobe@loop.service... May 17 00:35:25.748692 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:35:25.748918 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:35:25.749084 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:25.749990 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:35:25.750142 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:35:25.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.752891 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:35:25.753042 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:35:25.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.755577 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:35:25.755714 systemd[1]: Finished modprobe@loop.service. May 17 00:35:25.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.760482 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:25.760882 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:35:25.762229 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:35:25.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.764945 systemd[1]: Starting modprobe@drm.service... May 17 00:35:25.766138 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:35:25.768365 systemd[1]: Starting modprobe@loop.service... May 17 00:35:25.768584 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:35:25.768731 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:35:25.768974 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:35:25.769949 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:35:25.770101 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:35:25.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.774207 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:35:25.774383 systemd[1]: Finished modprobe@drm.service. May 17 00:35:25.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.775477 systemd[1]: Finished ensure-sysext.service. May 17 00:35:25.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.778305 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:35:25.778477 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:35:25.778847 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:35:25.778953 systemd[1]: Finished modprobe@loop.service. May 17 00:35:25.779093 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:35:25.779126 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:35:25.788263 systemd-fsck[1254]: fsck.fat 4.2 (2021-01-31) May 17 00:35:25.788263 systemd-fsck[1254]: /dev/sda1: 790 files, 120726/258078 clusters May 17 00:35:25.789491 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:35:25.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.793929 systemd[1]: Mounting boot.mount... May 17 00:35:25.808403 systemd[1]: Mounted boot.mount. May 17 00:35:25.823003 systemd[1]: Finished systemd-boot-update.service. May 17 00:35:25.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.903023 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:35:25.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.906467 systemd[1]: Starting audit-rules.service... May 17 00:35:25.909633 systemd[1]: Starting clean-ca-certificates.service... May 17 00:35:25.913416 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:35:25.915000 audit: BPF prog-id=36 op=LOAD May 17 00:35:25.917525 systemd[1]: Starting systemd-resolved.service... May 17 00:35:25.920000 audit: BPF prog-id=37 op=LOAD May 17 00:35:25.922250 systemd[1]: Starting systemd-timesyncd.service... May 17 00:35:25.925293 systemd[1]: Starting systemd-update-utmp.service... May 17 00:35:25.942050 systemd[1]: Finished clean-ca-certificates.service. May 17 00:35:25.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:25.944213 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:35:25.947000 audit[1370]: SYSTEM_BOOT pid=1370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:35:25.950515 systemd[1]: Finished systemd-update-utmp.service. May 17 00:35:25.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:26.021954 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:35:26.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:26.028981 systemd-networkd[1181]: eth0: Gained IPv6LL May 17 00:35:26.030083 augenrules[1384]: No rules May 17 00:35:26.029000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:35:26.029000 audit[1384]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff601122f0 a2=420 a3=0 items=0 ppid=1364 pid=1384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:26.029000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:35:26.030684 systemd[1]: Finished audit-rules.service. May 17 00:35:26.035717 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:35:26.038638 systemd[1]: Started systemd-timesyncd.service. May 17 00:35:26.040934 systemd[1]: Reached target time-set.target. May 17 00:35:26.061810 systemd-resolved[1368]: Positive Trust Anchors: May 17 00:35:26.061827 systemd-resolved[1368]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:35:26.061866 systemd-resolved[1368]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:35:26.083367 systemd-timesyncd[1369]: Contacted time server 83.137.225.123:123 (0.flatcar.pool.ntp.org). May 17 00:35:26.083500 systemd-timesyncd[1369]: Initial clock synchronization to Sat 2025-05-17 00:35:26.085841 UTC. May 17 00:35:26.196062 systemd-resolved[1368]: Using system hostname 'ci-3510.3.7-n-cef16a74b5'. May 17 00:35:26.197872 systemd[1]: Started systemd-resolved.service. May 17 00:35:26.200127 systemd[1]: Reached target network.target. May 17 00:35:26.202313 systemd[1]: Reached target network-online.target. May 17 00:35:26.204513 systemd[1]: Reached target nss-lookup.target. May 17 00:35:31.329238 ldconfig[1246]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:35:31.339522 systemd[1]: Finished ldconfig.service. May 17 00:35:31.343435 systemd[1]: Starting systemd-update-done.service... May 17 00:35:31.350323 systemd[1]: Finished systemd-update-done.service. May 17 00:35:31.352555 systemd[1]: Reached target sysinit.target. May 17 00:35:31.354406 systemd[1]: Started motdgen.path. May 17 00:35:31.355960 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:35:31.358512 systemd[1]: Started logrotate.timer. May 17 00:35:31.360272 systemd[1]: Started mdadm.timer. May 17 00:35:31.361978 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:35:31.363944 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:35:31.363986 systemd[1]: Reached target paths.target. May 17 00:35:31.365657 systemd[1]: Reached target timers.target. May 17 00:35:31.367694 systemd[1]: Listening on dbus.socket. May 17 00:35:31.370471 systemd[1]: Starting docker.socket... May 17 00:35:31.374601 systemd[1]: Listening on sshd.socket. May 17 00:35:31.376518 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:35:31.377005 systemd[1]: Listening on docker.socket. May 17 00:35:31.378864 systemd[1]: Reached target sockets.target. May 17 00:35:31.380669 systemd[1]: Reached target basic.target. May 17 00:35:31.382443 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:35:31.382477 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:35:31.383551 systemd[1]: Starting containerd.service... May 17 00:35:31.386556 systemd[1]: Starting dbus.service... May 17 00:35:31.389273 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:35:31.392685 systemd[1]: Starting extend-filesystems.service... May 17 00:35:31.394595 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:35:31.396454 systemd[1]: Starting kubelet.service... May 17 00:35:31.401444 systemd[1]: Starting motdgen.service... May 17 00:35:31.404709 systemd[1]: Started nvidia.service. May 17 00:35:31.408438 systemd[1]: Starting prepare-helm.service... May 17 00:35:31.411815 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:35:31.415279 systemd[1]: Starting sshd-keygen.service... May 17 00:35:31.420339 systemd[1]: Starting systemd-logind.service... May 17 00:35:31.425191 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:35:31.425295 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:35:31.425918 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:35:31.426880 systemd[1]: Starting update-engine.service... May 17 00:35:31.430387 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:35:31.437828 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:35:31.438057 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:35:31.467319 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:35:31.467546 systemd[1]: Finished motdgen.service. May 17 00:35:31.520823 systemd-logind[1408]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:35:31.527913 systemd-logind[1408]: New seat seat0. May 17 00:35:31.540697 jq[1395]: false May 17 00:35:31.543602 jq[1410]: true May 17 00:35:31.545914 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:35:31.546168 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:35:31.567389 env[1418]: time="2025-05-17T00:35:31.567241010Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:35:31.569476 extend-filesystems[1396]: Found loop1 May 17 00:35:31.571889 extend-filesystems[1396]: Found sda May 17 00:35:31.571889 extend-filesystems[1396]: Found sda1 May 17 00:35:31.571889 extend-filesystems[1396]: Found sda2 May 17 00:35:31.571889 extend-filesystems[1396]: Found sda3 May 17 00:35:31.571889 extend-filesystems[1396]: Found usr May 17 00:35:31.571889 extend-filesystems[1396]: Found sda4 May 17 00:35:31.571889 extend-filesystems[1396]: Found sda6 May 17 00:35:31.571889 extend-filesystems[1396]: Found sda7 May 17 00:35:31.571889 extend-filesystems[1396]: Found sda9 May 17 00:35:31.571889 extend-filesystems[1396]: Checking size of /dev/sda9 May 17 00:35:31.590034 jq[1427]: true May 17 00:35:31.634286 env[1418]: time="2025-05-17T00:35:31.634239509Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:35:31.635319 env[1418]: time="2025-05-17T00:35:31.634410830Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:35:31.636323 env[1418]: time="2025-05-17T00:35:31.636294264Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:35:31.637316 env[1418]: time="2025-05-17T00:35:31.637295188Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:35:31.637609 env[1418]: time="2025-05-17T00:35:31.637590424Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:35:31.638751 env[1418]: time="2025-05-17T00:35:31.638732966Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:35:31.638942 env[1418]: time="2025-05-17T00:35:31.638922789Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:35:31.639038 env[1418]: time="2025-05-17T00:35:31.639021701Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:35:31.639196 env[1418]: time="2025-05-17T00:35:31.639182421Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:35:31.639600 env[1418]: time="2025-05-17T00:35:31.639575770Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:35:31.644158 env[1418]: time="2025-05-17T00:35:31.644129534Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:35:31.644260 env[1418]: time="2025-05-17T00:35:31.644244348Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:35:31.644380 env[1418]: time="2025-05-17T00:35:31.644363763Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:35:31.644452 env[1418]: time="2025-05-17T00:35:31.644439972Z" level=info msg="metadata content store policy set" policy=shared May 17 00:35:31.669672 env[1418]: time="2025-05-17T00:35:31.668852296Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:35:31.669672 env[1418]: time="2025-05-17T00:35:31.668890101Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:35:31.669672 env[1418]: time="2025-05-17T00:35:31.668909003Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:35:31.669672 env[1418]: time="2025-05-17T00:35:31.668946008Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:35:31.669672 env[1418]: time="2025-05-17T00:35:31.668967511Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:35:31.669672 env[1418]: time="2025-05-17T00:35:31.668986913Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:35:31.669672 env[1418]: time="2025-05-17T00:35:31.669004415Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:35:31.669672 env[1418]: time="2025-05-17T00:35:31.669023017Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:35:31.669672 env[1418]: time="2025-05-17T00:35:31.669042220Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:35:31.669672 env[1418]: time="2025-05-17T00:35:31.669060322Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:35:31.669672 env[1418]: time="2025-05-17T00:35:31.669078824Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:35:31.669672 env[1418]: time="2025-05-17T00:35:31.669097027Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:35:31.669672 env[1418]: time="2025-05-17T00:35:31.669213941Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:35:31.669672 env[1418]: time="2025-05-17T00:35:31.669297451Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:35:31.672562 env[1418]: time="2025-05-17T00:35:31.671371008Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:35:31.672562 env[1418]: time="2025-05-17T00:35:31.671412413Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:35:31.672562 env[1418]: time="2025-05-17T00:35:31.671432916Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:35:31.672562 env[1418]: time="2025-05-17T00:35:31.671581634Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:35:31.672562 env[1418]: time="2025-05-17T00:35:31.671616139Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:35:31.672562 env[1418]: time="2025-05-17T00:35:31.671635241Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:35:31.672562 env[1418]: time="2025-05-17T00:35:31.671651943Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:35:31.672562 env[1418]: time="2025-05-17T00:35:31.671669945Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:35:31.672562 env[1418]: time="2025-05-17T00:35:31.671700649Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:35:31.672562 env[1418]: time="2025-05-17T00:35:31.671718951Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:35:31.672562 env[1418]: time="2025-05-17T00:35:31.671735053Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:35:31.672562 env[1418]: time="2025-05-17T00:35:31.671776659Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:35:31.672562 env[1418]: time="2025-05-17T00:35:31.671953780Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:35:31.672562 env[1418]: time="2025-05-17T00:35:31.671974583Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:35:31.672562 env[1418]: time="2025-05-17T00:35:31.671990185Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:35:31.673128 env[1418]: time="2025-05-17T00:35:31.672014888Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:35:31.673128 env[1418]: time="2025-05-17T00:35:31.672034690Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:35:31.673128 env[1418]: time="2025-05-17T00:35:31.672048592Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:35:31.673128 env[1418]: time="2025-05-17T00:35:31.672088997Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:35:31.673128 env[1418]: time="2025-05-17T00:35:31.672131002Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:35:31.673306 env[1418]: time="2025-05-17T00:35:31.672449142Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:35:31.673306 env[1418]: time="2025-05-17T00:35:31.672538353Z" level=info msg="Connect containerd service" May 17 00:35:31.683548 env[1418]: time="2025-05-17T00:35:31.673466268Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:35:31.683548 env[1418]: time="2025-05-17T00:35:31.674302271Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:35:31.683548 env[1418]: time="2025-05-17T00:35:31.675342900Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:35:31.683548 env[1418]: time="2025-05-17T00:35:31.675402508Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:35:31.683548 env[1418]: time="2025-05-17T00:35:31.675464715Z" level=info msg="containerd successfully booted in 0.109256s" May 17 00:35:31.675535 systemd[1]: Started containerd.service. May 17 00:35:31.683838 tar[1415]: linux-amd64/helm May 17 00:35:31.692200 env[1418]: time="2025-05-17T00:35:31.692044869Z" level=info msg="Start subscribing containerd event" May 17 00:35:31.692200 env[1418]: time="2025-05-17T00:35:31.692167484Z" level=info msg="Start recovering state" May 17 00:35:31.693784 env[1418]: time="2025-05-17T00:35:31.692434717Z" level=info msg="Start event monitor" May 17 00:35:31.693784 env[1418]: time="2025-05-17T00:35:31.692469922Z" level=info msg="Start snapshots syncer" May 17 00:35:31.693784 env[1418]: time="2025-05-17T00:35:31.692488524Z" level=info msg="Start cni network conf syncer for default" May 17 00:35:31.693784 env[1418]: time="2025-05-17T00:35:31.692500825Z" level=info msg="Start streaming server" May 17 00:35:31.736231 extend-filesystems[1396]: Old size kept for /dev/sda9 May 17 00:35:31.749077 extend-filesystems[1396]: Found sr0 May 17 00:35:31.737084 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:35:31.737234 systemd[1]: Finished extend-filesystems.service. May 17 00:35:31.897638 dbus-daemon[1394]: [system] SELinux support is enabled May 17 00:35:31.897839 systemd[1]: Started dbus.service. May 17 00:35:31.902083 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:35:31.902120 systemd[1]: Reached target system-config.target. May 17 00:35:31.904122 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:35:31.904164 systemd[1]: Reached target user-config.target. May 17 00:35:31.909446 systemd[1]: Started systemd-logind.service. May 17 00:35:31.910023 dbus-daemon[1394]: [system] Successfully activated service 'org.freedesktop.systemd1' May 17 00:35:31.953784 bash[1460]: Updated "/home/core/.ssh/authorized_keys" May 17 00:35:31.959039 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:35:32.218014 systemd[1]: nvidia.service: Deactivated successfully. May 17 00:35:32.397492 tar[1415]: linux-amd64/LICENSE May 17 00:35:32.397739 tar[1415]: linux-amd64/README.md May 17 00:35:32.404796 systemd[1]: Finished prepare-helm.service. May 17 00:35:32.833793 systemd[1]: Started kubelet.service. May 17 00:35:33.414679 update_engine[1409]: I0517 00:35:33.414124 1409 main.cc:92] Flatcar Update Engine starting May 17 00:35:33.468528 kubelet[1498]: E0517 00:35:33.468484 1498 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:35:33.470863 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:35:33.471016 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:35:33.471288 systemd[1]: kubelet.service: Consumed 1.193s CPU time. May 17 00:35:33.548370 systemd[1]: Started update-engine.service. May 17 00:35:33.556139 update_engine[1409]: I0517 00:35:33.555837 1409 update_check_scheduler.cc:74] Next update check in 8m56s May 17 00:35:33.553078 systemd[1]: Started locksmithd.service. May 17 00:35:33.983258 sshd_keygen[1416]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:35:34.003379 systemd[1]: Finished sshd-keygen.service. May 17 00:35:34.007697 systemd[1]: Starting issuegen.service... May 17 00:35:34.011345 systemd[1]: Started waagent.service. May 17 00:35:34.016061 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:35:34.016249 systemd[1]: Finished issuegen.service. May 17 00:35:34.019816 systemd[1]: Starting systemd-user-sessions.service... May 17 00:35:34.039235 systemd[1]: Finished systemd-user-sessions.service. May 17 00:35:34.043114 systemd[1]: Started getty@tty1.service. May 17 00:35:34.047972 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:35:34.052327 systemd[1]: Reached target getty.target. May 17 00:35:34.054209 systemd[1]: Reached target multi-user.target. May 17 00:35:34.058112 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:35:34.069588 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:35:34.069794 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:35:34.072369 systemd[1]: Startup finished in 586ms (firmware) + 8.221s (loader) + 863ms (kernel) + 7.263s (initrd) + 15.022s (userspace) = 31.957s. May 17 00:35:34.551395 login[1518]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:35:34.553386 login[1519]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:35:34.600722 systemd[1]: Created slice user-500.slice. May 17 00:35:34.602219 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:35:34.608872 systemd-logind[1408]: New session 1 of user core. May 17 00:35:34.612411 systemd-logind[1408]: New session 2 of user core. May 17 00:35:34.616324 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:35:34.618321 systemd[1]: Starting user@500.service... May 17 00:35:34.621776 (systemd)[1525]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:35:34.895574 systemd[1525]: Queued start job for default target default.target. May 17 00:35:34.896385 systemd[1525]: Reached target paths.target. May 17 00:35:34.896420 systemd[1525]: Reached target sockets.target. May 17 00:35:34.896442 systemd[1525]: Reached target timers.target. May 17 00:35:34.896461 systemd[1525]: Reached target basic.target. May 17 00:35:34.896611 systemd[1]: Started user@500.service. May 17 00:35:34.898159 systemd[1]: Started session-1.scope. May 17 00:35:34.899165 systemd[1]: Started session-2.scope. May 17 00:35:34.900343 systemd[1525]: Reached target default.target. May 17 00:35:34.900577 systemd[1525]: Startup finished in 272ms. May 17 00:35:36.588521 locksmithd[1504]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:35:42.230230 waagent[1513]: 2025-05-17T00:35:42.230090Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 May 17 00:35:42.242258 waagent[1513]: 2025-05-17T00:35:42.232505Z INFO Daemon Daemon OS: flatcar 3510.3.7 May 17 00:35:42.242258 waagent[1513]: 2025-05-17T00:35:42.233349Z INFO Daemon Daemon Python: 3.9.16 May 17 00:35:42.242258 waagent[1513]: 2025-05-17T00:35:42.234524Z INFO Daemon Daemon Run daemon May 17 00:35:42.242258 waagent[1513]: 2025-05-17T00:35:42.235709Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.7' May 17 00:35:42.246724 waagent[1513]: 2025-05-17T00:35:42.246602Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 17 00:35:42.253233 waagent[1513]: 2025-05-17T00:35:42.253113Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 17 00:35:42.279253 waagent[1513]: 2025-05-17T00:35:42.254355Z INFO Daemon Daemon cloud-init is enabled: False May 17 00:35:42.279253 waagent[1513]: 2025-05-17T00:35:42.255047Z INFO Daemon Daemon Using waagent for provisioning May 17 00:35:42.279253 waagent[1513]: 2025-05-17T00:35:42.256769Z INFO Daemon Daemon Activate resource disk May 17 00:35:42.279253 waagent[1513]: 2025-05-17T00:35:42.257356Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb May 17 00:35:42.279253 waagent[1513]: 2025-05-17T00:35:42.265121Z INFO Daemon Daemon Found device: None May 17 00:35:42.279253 waagent[1513]: 2025-05-17T00:35:42.266879Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology May 17 00:35:42.279253 waagent[1513]: 2025-05-17T00:35:42.267612Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 May 17 00:35:42.279253 waagent[1513]: 2025-05-17T00:35:42.269350Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 17 00:35:42.279253 waagent[1513]: 2025-05-17T00:35:42.270077Z INFO Daemon Daemon Running default provisioning handler May 17 00:35:42.280091 waagent[1513]: 2025-05-17T00:35:42.279973Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 17 00:35:42.287697 waagent[1513]: 2025-05-17T00:35:42.287582Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 17 00:35:42.292260 waagent[1513]: 2025-05-17T00:35:42.292187Z INFO Daemon Daemon cloud-init is enabled: False May 17 00:35:42.294702 waagent[1513]: 2025-05-17T00:35:42.294637Z INFO Daemon Daemon Copying ovf-env.xml May 17 00:35:42.437815 waagent[1513]: 2025-05-17T00:35:42.434620Z INFO Daemon Daemon Successfully mounted dvd May 17 00:35:42.880890 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. May 17 00:35:42.934726 waagent[1513]: 2025-05-17T00:35:42.934563Z INFO Daemon Daemon Detect protocol endpoint May 17 00:35:42.947725 waagent[1513]: 2025-05-17T00:35:42.935962Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 17 00:35:42.947725 waagent[1513]: 2025-05-17T00:35:42.936880Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler May 17 00:35:42.947725 waagent[1513]: 2025-05-17T00:35:42.937518Z INFO Daemon Daemon Test for route to 168.63.129.16 May 17 00:35:42.947725 waagent[1513]: 2025-05-17T00:35:42.938565Z INFO Daemon Daemon Route to 168.63.129.16 exists May 17 00:35:42.947725 waagent[1513]: 2025-05-17T00:35:42.939555Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 May 17 00:35:42.969590 waagent[1513]: 2025-05-17T00:35:42.969512Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 May 17 00:35:42.976893 waagent[1513]: 2025-05-17T00:35:42.971393Z INFO Daemon Daemon Wire protocol version:2012-11-30 May 17 00:35:42.976893 waagent[1513]: 2025-05-17T00:35:42.972021Z INFO Daemon Daemon Server preferred version:2015-04-05 May 17 00:35:43.641047 waagent[1513]: 2025-05-17T00:35:43.640899Z INFO Daemon Daemon Initializing goal state during protocol detection May 17 00:35:43.651273 waagent[1513]: 2025-05-17T00:35:43.651197Z INFO Daemon Daemon Forcing an update of the goal state.. May 17 00:35:43.655810 waagent[1513]: 2025-05-17T00:35:43.652318Z INFO Daemon Daemon Fetching goal state [incarnation 1] May 17 00:35:43.722282 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 00:35:43.722591 systemd[1]: Stopped kubelet.service. May 17 00:35:43.722663 systemd[1]: kubelet.service: Consumed 1.193s CPU time. May 17 00:35:43.724799 systemd[1]: Starting kubelet.service... May 17 00:35:43.890240 systemd[1]: Started kubelet.service. May 17 00:35:43.934150 waagent[1513]: 2025-05-17T00:35:43.934023Z INFO Daemon Daemon Found private key matching thumbprint 4B3F247CC34DAF5D28A116294C4308EFC3A7DA78 May 17 00:35:43.938259 waagent[1513]: 2025-05-17T00:35:43.938185Z INFO Daemon Daemon Fetch goal state completed May 17 00:35:43.959984 waagent[1513]: 2025-05-17T00:35:43.959919Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: f3e981fa-e0ea-4d02-8bc6-5f3a7cc6da49 New eTag: 13778917217988367250] May 17 00:35:43.964779 waagent[1513]: 2025-05-17T00:35:43.964690Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob May 17 00:35:43.976700 waagent[1513]: 2025-05-17T00:35:43.976632Z INFO Daemon Daemon Starting provisioning May 17 00:35:43.979090 waagent[1513]: 2025-05-17T00:35:43.979024Z INFO Daemon Daemon Handle ovf-env.xml. May 17 00:35:43.981274 waagent[1513]: 2025-05-17T00:35:43.981207Z INFO Daemon Daemon Set hostname [ci-3510.3.7-n-cef16a74b5] May 17 00:35:44.574563 waagent[1513]: 2025-05-17T00:35:44.574402Z INFO Daemon Daemon Publish hostname [ci-3510.3.7-n-cef16a74b5] May 17 00:35:44.576520 waagent[1513]: 2025-05-17T00:35:44.576447Z INFO Daemon Daemon Examine /proc/net/route for primary interface May 17 00:35:44.577743 waagent[1513]: 2025-05-17T00:35:44.577686Z INFO Daemon Daemon Primary interface is [eth0] May 17 00:35:44.584675 kubelet[1564]: E0517 00:35:44.584636 1564 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:35:44.590163 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:35:44.590332 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:35:44.594464 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. May 17 00:35:44.594702 systemd[1]: Stopped systemd-networkd-wait-online.service. May 17 00:35:44.594785 systemd[1]: Stopping systemd-networkd-wait-online.service... May 17 00:35:44.595093 systemd[1]: Stopping systemd-networkd.service... May 17 00:35:44.599824 systemd-networkd[1181]: eth0: DHCPv6 lease lost May 17 00:35:44.601223 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:35:44.601407 systemd[1]: Stopped systemd-networkd.service. May 17 00:35:44.603743 systemd[1]: Starting systemd-networkd.service... May 17 00:35:44.636312 systemd-networkd[1573]: enP3220s1: Link UP May 17 00:35:44.636323 systemd-networkd[1573]: enP3220s1: Gained carrier May 17 00:35:44.637682 systemd-networkd[1573]: eth0: Link UP May 17 00:35:44.637692 systemd-networkd[1573]: eth0: Gained carrier May 17 00:35:44.638144 systemd-networkd[1573]: lo: Link UP May 17 00:35:44.638153 systemd-networkd[1573]: lo: Gained carrier May 17 00:35:44.638464 systemd-networkd[1573]: eth0: Gained IPv6LL May 17 00:35:44.638742 systemd-networkd[1573]: Enumeration completed May 17 00:35:44.639013 systemd[1]: Started systemd-networkd.service. May 17 00:35:44.640805 waagent[1513]: 2025-05-17T00:35:44.640628Z INFO Daemon Daemon Create user account if not exists May 17 00:35:44.642450 waagent[1513]: 2025-05-17T00:35:44.642384Z INFO Daemon Daemon User core already exists, skip useradd May 17 00:35:44.643485 waagent[1513]: 2025-05-17T00:35:44.643425Z INFO Daemon Daemon Configure sudoer May 17 00:35:44.647461 waagent[1513]: 2025-05-17T00:35:44.647394Z INFO Daemon Daemon Configure sshd May 17 00:35:44.648840 systemd-networkd[1573]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:35:44.649754 waagent[1513]: 2025-05-17T00:35:44.649685Z INFO Daemon Daemon Deploy ssh public key. May 17 00:35:44.652964 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:35:44.683891 systemd-networkd[1573]: eth0: DHCPv4 address 10.200.4.20/24, gateway 10.200.4.1 acquired from 168.63.129.16 May 17 00:35:44.688469 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:35:45.764958 waagent[1513]: 2025-05-17T00:35:45.764858Z INFO Daemon Daemon Provisioning complete May 17 00:35:45.780784 waagent[1513]: 2025-05-17T00:35:45.780705Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping May 17 00:35:45.783865 waagent[1513]: 2025-05-17T00:35:45.783796Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. May 17 00:35:45.788912 waagent[1513]: 2025-05-17T00:35:45.788844Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent May 17 00:35:46.056265 waagent[1580]: 2025-05-17T00:35:46.056096Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent May 17 00:35:46.056996 waagent[1580]: 2025-05-17T00:35:46.056932Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:35:46.057144 waagent[1580]: 2025-05-17T00:35:46.057088Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:35:46.068195 waagent[1580]: 2025-05-17T00:35:46.068120Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. May 17 00:35:46.068359 waagent[1580]: 2025-05-17T00:35:46.068304Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] May 17 00:35:46.120841 waagent[1580]: 2025-05-17T00:35:46.120688Z INFO ExtHandler ExtHandler Found private key matching thumbprint 4B3F247CC34DAF5D28A116294C4308EFC3A7DA78 May 17 00:35:46.121147 waagent[1580]: 2025-05-17T00:35:46.121085Z INFO ExtHandler ExtHandler Fetch goal state completed May 17 00:35:46.133798 waagent[1580]: 2025-05-17T00:35:46.133726Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 16dabc77-a4cc-4186-9225-e61715caf274 New eTag: 13778917217988367250] May 17 00:35:46.134323 waagent[1580]: 2025-05-17T00:35:46.134266Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob May 17 00:35:46.175136 waagent[1580]: 2025-05-17T00:35:46.175001Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; May 17 00:35:46.186879 waagent[1580]: 2025-05-17T00:35:46.186787Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1580 May 17 00:35:46.190297 waagent[1580]: 2025-05-17T00:35:46.190224Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 17 00:35:46.191475 waagent[1580]: 2025-05-17T00:35:46.191415Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules May 17 00:35:46.222432 waagent[1580]: 2025-05-17T00:35:46.222366Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 17 00:35:46.222864 waagent[1580]: 2025-05-17T00:35:46.222800Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 17 00:35:46.230890 waagent[1580]: 2025-05-17T00:35:46.230835Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 17 00:35:46.231364 waagent[1580]: 2025-05-17T00:35:46.231303Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 17 00:35:46.232406 waagent[1580]: 2025-05-17T00:35:46.232343Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] May 17 00:35:46.233688 waagent[1580]: 2025-05-17T00:35:46.233626Z INFO ExtHandler ExtHandler Starting env monitor service. May 17 00:35:46.234509 waagent[1580]: 2025-05-17T00:35:46.234450Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 17 00:35:46.235039 waagent[1580]: 2025-05-17T00:35:46.234979Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 17 00:35:46.235136 waagent[1580]: 2025-05-17T00:35:46.235079Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:35:46.235286 waagent[1580]: 2025-05-17T00:35:46.235236Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 17 00:35:46.235574 waagent[1580]: 2025-05-17T00:35:46.235522Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:35:46.235726 waagent[1580]: 2025-05-17T00:35:46.235681Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:35:46.236167 waagent[1580]: 2025-05-17T00:35:46.236112Z INFO EnvHandler ExtHandler Configure routes May 17 00:35:46.236308 waagent[1580]: 2025-05-17T00:35:46.236263Z INFO EnvHandler ExtHandler Gateway:None May 17 00:35:46.236437 waagent[1580]: 2025-05-17T00:35:46.236394Z INFO EnvHandler ExtHandler Routes:None May 17 00:35:46.237472 waagent[1580]: 2025-05-17T00:35:46.237416Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:35:46.237696 waagent[1580]: 2025-05-17T00:35:46.237641Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 17 00:35:46.239833 waagent[1580]: 2025-05-17T00:35:46.239527Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 17 00:35:46.242271 waagent[1580]: 2025-05-17T00:35:46.242193Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 17 00:35:46.242626 waagent[1580]: 2025-05-17T00:35:46.242555Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 17 00:35:46.242626 waagent[1580]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 17 00:35:46.242626 waagent[1580]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 May 17 00:35:46.242626 waagent[1580]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 17 00:35:46.242626 waagent[1580]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 17 00:35:46.242626 waagent[1580]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:35:46.242626 waagent[1580]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:35:46.245850 waagent[1580]: 2025-05-17T00:35:46.245641Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 17 00:35:46.254914 waagent[1580]: 2025-05-17T00:35:46.254830Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) May 17 00:35:46.255708 waagent[1580]: 2025-05-17T00:35:46.255655Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 17 00:35:46.256927 waagent[1580]: 2025-05-17T00:35:46.256867Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' May 17 00:35:46.258751 waagent[1580]: 2025-05-17T00:35:46.258691Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1573' May 17 00:35:46.283701 waagent[1580]: 2025-05-17T00:35:46.283597Z INFO MonitorHandler ExtHandler Network interfaces: May 17 00:35:46.283701 waagent[1580]: Executing ['ip', '-a', '-o', 'link']: May 17 00:35:46.283701 waagent[1580]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 17 00:35:46.283701 waagent[1580]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:d1:e8:03 brd ff:ff:ff:ff:ff:ff May 17 00:35:46.283701 waagent[1580]: 3: enP3220s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:d1:e8:03 brd ff:ff:ff:ff:ff:ff\ altname enP3220p0s2 May 17 00:35:46.283701 waagent[1580]: Executing ['ip', '-4', '-a', '-o', 'address']: May 17 00:35:46.283701 waagent[1580]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 17 00:35:46.283701 waagent[1580]: 2: eth0 inet 10.200.4.20/24 metric 1024 brd 10.200.4.255 scope global eth0\ valid_lft forever preferred_lft forever May 17 00:35:46.283701 waagent[1580]: Executing ['ip', '-6', '-a', '-o', 'address']: May 17 00:35:46.283701 waagent[1580]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 17 00:35:46.283701 waagent[1580]: 2: eth0 inet6 fe80::6245:bdff:fed1:e803/64 scope link \ valid_lft forever preferred_lft forever May 17 00:35:46.301421 waagent[1580]: 2025-05-17T00:35:46.301345Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. May 17 00:35:46.416207 waagent[1580]: 2025-05-17T00:35:46.416055Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules May 17 00:35:46.420819 waagent[1580]: 2025-05-17T00:35:46.420648Z INFO EnvHandler ExtHandler Firewall rules: May 17 00:35:46.420819 waagent[1580]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:35:46.420819 waagent[1580]: pkts bytes target prot opt in out source destination May 17 00:35:46.420819 waagent[1580]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 17 00:35:46.420819 waagent[1580]: pkts bytes target prot opt in out source destination May 17 00:35:46.420819 waagent[1580]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:35:46.420819 waagent[1580]: pkts bytes target prot opt in out source destination May 17 00:35:46.420819 waagent[1580]: 22 1144 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 17 00:35:46.420819 waagent[1580]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 17 00:35:46.423703 waagent[1580]: 2025-05-17T00:35:46.423640Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 May 17 00:35:46.462824 waagent[1580]: 2025-05-17T00:35:46.462741Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.13.1.1 -- exiting May 17 00:35:46.792557 waagent[1513]: 2025-05-17T00:35:46.792293Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running May 17 00:35:46.797865 waagent[1513]: 2025-05-17T00:35:46.797785Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.13.1.1 to be the latest agent May 17 00:35:47.838732 waagent[1618]: 2025-05-17T00:35:47.838622Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.13.1.1) May 17 00:35:47.840010 waagent[1618]: 2025-05-17T00:35:47.839940Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.7 May 17 00:35:47.840156 waagent[1618]: 2025-05-17T00:35:47.840101Z INFO ExtHandler ExtHandler Python: 3.9.16 May 17 00:35:47.840304 waagent[1618]: 2025-05-17T00:35:47.840258Z INFO ExtHandler ExtHandler CPU Arch: x86_64 May 17 00:35:47.855613 waagent[1618]: 2025-05-17T00:35:47.855512Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; May 17 00:35:47.856030 waagent[1618]: 2025-05-17T00:35:47.855968Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:35:47.856198 waagent[1618]: 2025-05-17T00:35:47.856150Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:35:47.856421 waagent[1618]: 2025-05-17T00:35:47.856372Z INFO ExtHandler ExtHandler Initializing the goal state... May 17 00:35:47.868496 waagent[1618]: 2025-05-17T00:35:47.868420Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] May 17 00:35:47.876536 waagent[1618]: 2025-05-17T00:35:47.876472Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.166 May 17 00:35:47.877469 waagent[1618]: 2025-05-17T00:35:47.877408Z INFO ExtHandler May 17 00:35:47.877616 waagent[1618]: 2025-05-17T00:35:47.877565Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 47a0600c-15ad-4741-9adb-d7c778984f24 eTag: 13778917217988367250 source: Fabric] May 17 00:35:47.878313 waagent[1618]: 2025-05-17T00:35:47.878257Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. May 17 00:35:47.879397 waagent[1618]: 2025-05-17T00:35:47.879337Z INFO ExtHandler May 17 00:35:47.879530 waagent[1618]: 2025-05-17T00:35:47.879478Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] May 17 00:35:47.885902 waagent[1618]: 2025-05-17T00:35:47.885849Z INFO ExtHandler ExtHandler Downloading artifacts profile blob May 17 00:35:47.886335 waagent[1618]: 2025-05-17T00:35:47.886285Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 17 00:35:47.905463 waagent[1618]: 2025-05-17T00:35:47.905382Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. May 17 00:35:47.960609 waagent[1618]: 2025-05-17T00:35:47.960476Z INFO ExtHandler Downloaded certificate {'thumbprint': '4B3F247CC34DAF5D28A116294C4308EFC3A7DA78', 'hasPrivateKey': True} May 17 00:35:47.961876 waagent[1618]: 2025-05-17T00:35:47.961808Z INFO ExtHandler Fetch goal state from WireServer completed May 17 00:35:47.962684 waagent[1618]: 2025-05-17T00:35:47.962624Z INFO ExtHandler ExtHandler Goal state initialization completed. May 17 00:35:47.980712 waagent[1618]: 2025-05-17T00:35:47.980609Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) May 17 00:35:47.988821 waagent[1618]: 2025-05-17T00:35:47.988712Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 17 00:35:47.992422 waagent[1618]: 2025-05-17T00:35:47.992329Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] May 17 00:35:47.992629 waagent[1618]: 2025-05-17T00:35:47.992578Z INFO ExtHandler ExtHandler Checking state of the firewall May 17 00:35:48.007376 waagent[1618]: 2025-05-17T00:35:48.007266Z WARNING ExtHandler ExtHandler The firewall rules for Azure Fabric are not setup correctly (the environment thread will fix it): The following rules are missing: ['ACCEPT DNS'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n']. Current state: May 17 00:35:48.007376 waagent[1618]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:35:48.007376 waagent[1618]: pkts bytes target prot opt in out source destination May 17 00:35:48.007376 waagent[1618]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 17 00:35:48.007376 waagent[1618]: pkts bytes target prot opt in out source destination May 17 00:35:48.007376 waagent[1618]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:35:48.007376 waagent[1618]: pkts bytes target prot opt in out source destination May 17 00:35:48.007376 waagent[1618]: 102 11004 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 17 00:35:48.007376 waagent[1618]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 17 00:35:48.008458 waagent[1618]: 2025-05-17T00:35:48.008391Z INFO ExtHandler ExtHandler Setting up persistent firewall rules May 17 00:35:48.011058 waagent[1618]: 2025-05-17T00:35:48.010959Z INFO ExtHandler ExtHandler The firewalld service is not present on the system May 17 00:35:48.011300 waagent[1618]: 2025-05-17T00:35:48.011248Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 17 00:35:48.011672 waagent[1618]: 2025-05-17T00:35:48.011614Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 17 00:35:48.019751 waagent[1618]: 2025-05-17T00:35:48.019694Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 17 00:35:48.020250 waagent[1618]: 2025-05-17T00:35:48.020191Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 17 00:35:48.027551 waagent[1618]: 2025-05-17T00:35:48.027489Z INFO ExtHandler ExtHandler WALinuxAgent-2.13.1.1 running as process 1618 May 17 00:35:48.030418 waagent[1618]: 2025-05-17T00:35:48.030355Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 17 00:35:48.031170 waagent[1618]: 2025-05-17T00:35:48.031112Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled May 17 00:35:48.031983 waagent[1618]: 2025-05-17T00:35:48.031924Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False May 17 00:35:48.034400 waagent[1618]: 2025-05-17T00:35:48.034340Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] May 17 00:35:48.035625 waagent[1618]: 2025-05-17T00:35:48.035567Z INFO ExtHandler ExtHandler Starting env monitor service. May 17 00:35:48.036039 waagent[1618]: 2025-05-17T00:35:48.035983Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:35:48.036191 waagent[1618]: 2025-05-17T00:35:48.036145Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:35:48.036681 waagent[1618]: 2025-05-17T00:35:48.036623Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 17 00:35:48.036980 waagent[1618]: 2025-05-17T00:35:48.036926Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 17 00:35:48.036980 waagent[1618]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 17 00:35:48.036980 waagent[1618]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 May 17 00:35:48.036980 waagent[1618]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 17 00:35:48.036980 waagent[1618]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 17 00:35:48.036980 waagent[1618]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:35:48.036980 waagent[1618]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:35:48.039837 waagent[1618]: 2025-05-17T00:35:48.039692Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 17 00:35:48.041040 waagent[1618]: 2025-05-17T00:35:48.040969Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 17 00:35:48.041230 waagent[1618]: 2025-05-17T00:35:48.041175Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 17 00:35:48.044031 waagent[1618]: 2025-05-17T00:35:48.043775Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:35:48.045090 waagent[1618]: 2025-05-17T00:35:48.045029Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:35:48.045923 waagent[1618]: 2025-05-17T00:35:48.045865Z INFO EnvHandler ExtHandler Configure routes May 17 00:35:48.048568 waagent[1618]: 2025-05-17T00:35:48.048358Z INFO EnvHandler ExtHandler Gateway:None May 17 00:35:48.048746 waagent[1618]: 2025-05-17T00:35:48.048694Z INFO EnvHandler ExtHandler Routes:None May 17 00:35:48.050438 waagent[1618]: 2025-05-17T00:35:48.050361Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 17 00:35:48.050741 waagent[1618]: 2025-05-17T00:35:48.050678Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 17 00:35:48.052451 waagent[1618]: 2025-05-17T00:35:48.052380Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 17 00:35:48.064841 waagent[1618]: 2025-05-17T00:35:48.064751Z INFO MonitorHandler ExtHandler Network interfaces: May 17 00:35:48.064841 waagent[1618]: Executing ['ip', '-a', '-o', 'link']: May 17 00:35:48.064841 waagent[1618]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 17 00:35:48.064841 waagent[1618]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:d1:e8:03 brd ff:ff:ff:ff:ff:ff May 17 00:35:48.064841 waagent[1618]: 3: enP3220s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:d1:e8:03 brd ff:ff:ff:ff:ff:ff\ altname enP3220p0s2 May 17 00:35:48.064841 waagent[1618]: Executing ['ip', '-4', '-a', '-o', 'address']: May 17 00:35:48.064841 waagent[1618]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 17 00:35:48.064841 waagent[1618]: 2: eth0 inet 10.200.4.20/24 metric 1024 brd 10.200.4.255 scope global eth0\ valid_lft forever preferred_lft forever May 17 00:35:48.064841 waagent[1618]: Executing ['ip', '-6', '-a', '-o', 'address']: May 17 00:35:48.064841 waagent[1618]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 17 00:35:48.064841 waagent[1618]: 2: eth0 inet6 fe80::6245:bdff:fed1:e803/64 scope link \ valid_lft forever preferred_lft forever May 17 00:35:48.073855 waagent[1618]: 2025-05-17T00:35:48.073793Z INFO ExtHandler ExtHandler Downloading agent manifest May 17 00:35:48.086628 waagent[1618]: 2025-05-17T00:35:48.086564Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 17 00:35:48.102166 waagent[1618]: 2025-05-17T00:35:48.102064Z INFO ExtHandler ExtHandler May 17 00:35:48.109896 waagent[1618]: 2025-05-17T00:35:48.109827Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 998b41eb-425f-4c43-b782-6735bc798d96 correlation c763b60e-6f2c-49a9-aa03-c3d2321f255f created: 2025-05-17T00:34:51.727448Z] May 17 00:35:48.114729 waagent[1618]: 2025-05-17T00:35:48.114648Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. May 17 00:35:48.118909 waagent[1618]: 2025-05-17T00:35:48.118848Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 16 ms] May 17 00:35:48.125449 waagent[1618]: 2025-05-17T00:35:48.125388Z WARNING EnvHandler ExtHandler The firewall is not configured correctly. The following rules are missing: ['ACCEPT DNS'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n']. Will reset it. Current state: May 17 00:35:48.125449 waagent[1618]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:35:48.125449 waagent[1618]: pkts bytes target prot opt in out source destination May 17 00:35:48.125449 waagent[1618]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 17 00:35:48.125449 waagent[1618]: pkts bytes target prot opt in out source destination May 17 00:35:48.125449 waagent[1618]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:35:48.125449 waagent[1618]: pkts bytes target prot opt in out source destination May 17 00:35:48.125449 waagent[1618]: 130 14452 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 17 00:35:48.125449 waagent[1618]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 17 00:35:48.149254 waagent[1618]: 2025-05-17T00:35:48.149185Z INFO ExtHandler ExtHandler Looking for existing remote access users. May 17 00:35:48.151725 waagent[1618]: 2025-05-17T00:35:48.151659Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.13.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 57230464-F21D-4ADB-8C4A-886F5FE18AFD;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] May 17 00:35:48.181274 waagent[1618]: 2025-05-17T00:35:48.181164Z INFO EnvHandler ExtHandler The firewall was setup successfully: May 17 00:35:48.181274 waagent[1618]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:35:48.181274 waagent[1618]: pkts bytes target prot opt in out source destination May 17 00:35:48.181274 waagent[1618]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 17 00:35:48.181274 waagent[1618]: pkts bytes target prot opt in out source destination May 17 00:35:48.181274 waagent[1618]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:35:48.181274 waagent[1618]: pkts bytes target prot opt in out source destination May 17 00:35:48.181274 waagent[1618]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 May 17 00:35:48.181274 waagent[1618]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 17 00:35:48.181274 waagent[1618]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 17 00:35:54.834080 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 17 00:35:54.834412 systemd[1]: Stopped kubelet.service. May 17 00:35:54.836438 systemd[1]: Starting kubelet.service... May 17 00:35:54.931193 systemd[1]: Started kubelet.service. May 17 00:35:55.626191 kubelet[1668]: E0517 00:35:55.626138 1668 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:35:55.628342 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:35:55.628499 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:36:05.834034 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 17 00:36:05.834336 systemd[1]: Stopped kubelet.service. May 17 00:36:05.836416 systemd[1]: Starting kubelet.service... May 17 00:36:05.929968 systemd[1]: Started kubelet.service. May 17 00:36:06.592966 kubelet[1677]: E0517 00:36:06.592916 1677 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:36:06.594694 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:36:06.594877 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:36:08.899590 systemd[1]: Created slice system-sshd.slice. May 17 00:36:08.901640 systemd[1]: Started sshd@0-10.200.4.20:22-10.200.16.10:47930.service. May 17 00:36:09.529249 sshd[1684]: Accepted publickey for core from 10.200.16.10 port 47930 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:36:09.531014 sshd[1684]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:09.536567 systemd[1]: Started session-3.scope. May 17 00:36:09.537045 systemd-logind[1408]: New session 3 of user core. May 17 00:36:10.060290 systemd[1]: Started sshd@1-10.200.4.20:22-10.200.16.10:47942.service. May 17 00:36:10.648167 sshd[1689]: Accepted publickey for core from 10.200.16.10 port 47942 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:36:10.649872 sshd[1689]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:10.653811 systemd-logind[1408]: New session 4 of user core. May 17 00:36:10.655066 systemd[1]: Started session-4.scope. May 17 00:36:11.079056 sshd[1689]: pam_unix(sshd:session): session closed for user core May 17 00:36:11.082369 systemd[1]: sshd@1-10.200.4.20:22-10.200.16.10:47942.service: Deactivated successfully. May 17 00:36:11.083242 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:36:11.083891 systemd-logind[1408]: Session 4 logged out. Waiting for processes to exit. May 17 00:36:11.084645 systemd-logind[1408]: Removed session 4. May 17 00:36:11.178575 systemd[1]: Started sshd@2-10.200.4.20:22-10.200.16.10:47946.service. May 17 00:36:11.766855 sshd[1695]: Accepted publickey for core from 10.200.16.10 port 47946 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:36:11.768524 sshd[1695]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:11.773447 systemd[1]: Started session-5.scope. May 17 00:36:11.774076 systemd-logind[1408]: New session 5 of user core. May 17 00:36:12.183680 sshd[1695]: pam_unix(sshd:session): session closed for user core May 17 00:36:12.186978 systemd[1]: sshd@2-10.200.4.20:22-10.200.16.10:47946.service: Deactivated successfully. May 17 00:36:12.188003 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:36:12.188601 systemd-logind[1408]: Session 5 logged out. Waiting for processes to exit. May 17 00:36:12.189399 systemd-logind[1408]: Removed session 5. May 17 00:36:12.282574 systemd[1]: Started sshd@3-10.200.4.20:22-10.200.16.10:47956.service. May 17 00:36:12.475805 kernel: hv_balloon: Max. dynamic memory size: 8192 MB May 17 00:36:12.868936 sshd[1701]: Accepted publickey for core from 10.200.16.10 port 47956 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:36:12.870587 sshd[1701]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:12.875880 systemd[1]: Started session-6.scope. May 17 00:36:12.876467 systemd-logind[1408]: New session 6 of user core. May 17 00:36:13.300014 sshd[1701]: pam_unix(sshd:session): session closed for user core May 17 00:36:13.303249 systemd[1]: sshd@3-10.200.4.20:22-10.200.16.10:47956.service: Deactivated successfully. May 17 00:36:13.304129 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:36:13.304792 systemd-logind[1408]: Session 6 logged out. Waiting for processes to exit. May 17 00:36:13.305540 systemd-logind[1408]: Removed session 6. May 17 00:36:13.399130 systemd[1]: Started sshd@4-10.200.4.20:22-10.200.16.10:47966.service. May 17 00:36:13.986590 sshd[1707]: Accepted publickey for core from 10.200.16.10 port 47966 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:36:13.988262 sshd[1707]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:13.993866 systemd-logind[1408]: New session 7 of user core. May 17 00:36:13.994058 systemd[1]: Started session-7.scope. May 17 00:36:14.407302 sudo[1710]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:36:14.407612 sudo[1710]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:36:14.418985 dbus-daemon[1394]: \xd0}eH+V: received setenforce notice (enforcing=-2124864912) May 17 00:36:14.420917 sudo[1710]: pam_unix(sudo:session): session closed for user root May 17 00:36:14.519334 sshd[1707]: pam_unix(sshd:session): session closed for user core May 17 00:36:14.523151 systemd[1]: sshd@4-10.200.4.20:22-10.200.16.10:47966.service: Deactivated successfully. May 17 00:36:14.524275 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:36:14.525128 systemd-logind[1408]: Session 7 logged out. Waiting for processes to exit. May 17 00:36:14.526178 systemd-logind[1408]: Removed session 7. May 17 00:36:14.618583 systemd[1]: Started sshd@5-10.200.4.20:22-10.200.16.10:47972.service. May 17 00:36:15.205862 sshd[1714]: Accepted publickey for core from 10.200.16.10 port 47972 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:36:15.207561 sshd[1714]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:15.212908 systemd[1]: Started session-8.scope. May 17 00:36:15.213505 systemd-logind[1408]: New session 8 of user core. May 17 00:36:15.538242 sudo[1718]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:36:15.538918 sudo[1718]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:36:15.541727 sudo[1718]: pam_unix(sudo:session): session closed for user root May 17 00:36:15.546540 sudo[1717]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:36:15.546852 sudo[1717]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:36:15.555999 systemd[1]: Stopping audit-rules.service... May 17 00:36:15.556000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:36:15.557815 auditctl[1721]: No rules May 17 00:36:15.560823 kernel: kauditd_printk_skb: 135 callbacks suppressed May 17 00:36:15.560886 kernel: audit: type=1305 audit(1747442175.556:217): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:36:15.558241 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:36:15.558403 systemd[1]: Stopped audit-rules.service. May 17 00:36:15.560536 systemd[1]: Starting audit-rules.service... May 17 00:36:15.581113 kernel: audit: type=1300 audit(1747442175.556:217): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdc3d67a90 a2=420 a3=0 items=0 ppid=1 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:15.556000 audit[1721]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdc3d67a90 a2=420 a3=0 items=0 ppid=1 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:15.556000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:36:15.585347 kernel: audit: type=1327 audit(1747442175.556:217): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:36:15.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:15.590891 augenrules[1738]: No rules May 17 00:36:15.591872 systemd[1]: Finished audit-rules.service. May 17 00:36:15.595335 kernel: audit: type=1131 audit(1747442175.557:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:15.595410 kernel: audit: type=1130 audit(1747442175.590:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:15.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:15.594337 sudo[1717]: pam_unix(sudo:session): session closed for user root May 17 00:36:15.590000 audit[1717]: USER_END pid=1717 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:15.615640 kernel: audit: type=1106 audit(1747442175.590:220): pid=1717 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:15.615714 kernel: audit: type=1104 audit(1747442175.590:221): pid=1717 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:15.590000 audit[1717]: CRED_DISP pid=1717 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:15.688181 sshd[1714]: pam_unix(sshd:session): session closed for user core May 17 00:36:15.689000 audit[1714]: USER_END pid=1714 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:15.691917 systemd[1]: sshd@5-10.200.4.20:22-10.200.16.10:47972.service: Deactivated successfully. May 17 00:36:15.692683 systemd[1]: session-8.scope: Deactivated successfully. May 17 00:36:15.693918 systemd-logind[1408]: Session 8 logged out. Waiting for processes to exit. May 17 00:36:15.694885 systemd-logind[1408]: Removed session 8. May 17 00:36:15.689000 audit[1714]: CRED_DISP pid=1714 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:15.714202 kernel: audit: type=1106 audit(1747442175.689:222): pid=1714 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:15.714283 kernel: audit: type=1104 audit(1747442175.689:223): pid=1714 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:15.714310 kernel: audit: type=1131 audit(1747442175.689:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.20:22-10.200.16.10:47972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:15.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.20:22-10.200.16.10:47972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:15.786997 systemd[1]: Started sshd@6-10.200.4.20:22-10.200.16.10:47976.service. May 17 00:36:15.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.20:22-10.200.16.10:47976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:16.373000 audit[1744]: USER_ACCT pid=1744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:16.374722 sshd[1744]: Accepted publickey for core from 10.200.16.10 port 47976 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:36:16.374000 audit[1744]: CRED_ACQ pid=1744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:16.374000 audit[1744]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7158c090 a2=3 a3=0 items=0 ppid=1 pid=1744 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:16.374000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:16.376420 sshd[1744]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:16.381225 systemd[1]: Started session-9.scope. May 17 00:36:16.381847 systemd-logind[1408]: New session 9 of user core. May 17 00:36:16.384000 audit[1744]: USER_START pid=1744 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:16.385000 audit[1746]: CRED_ACQ pid=1746 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:16.700000 audit[1747]: USER_ACCT pid=1747 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:16.700000 audit[1747]: CRED_REFR pid=1747 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:16.702156 sudo[1747]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:36:16.702529 sudo[1747]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:36:16.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:16.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:16.703641 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 17 00:36:16.703930 systemd[1]: Stopped kubelet.service. May 17 00:36:16.705749 systemd[1]: Starting kubelet.service... May 17 00:36:16.706000 audit[1747]: USER_START pid=1747 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:16.746928 systemd[1]: Starting docker.service... May 17 00:36:16.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:16.884872 systemd[1]: Started kubelet.service. May 17 00:36:16.920855 kubelet[1767]: E0517 00:36:16.920799 1767 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:36:16.922485 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:36:16.922647 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:36:16.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:36:16.988924 env[1759]: time="2025-05-17T00:36:16.988070206Z" level=info msg="Starting up" May 17 00:36:16.990455 env[1759]: time="2025-05-17T00:36:16.990421021Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:36:16.990600 env[1759]: time="2025-05-17T00:36:16.990579223Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:36:16.990685 env[1759]: time="2025-05-17T00:36:16.990668023Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:36:16.990748 env[1759]: time="2025-05-17T00:36:16.990736924Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:36:16.994008 env[1759]: time="2025-05-17T00:36:16.993980146Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:36:16.994008 env[1759]: time="2025-05-17T00:36:16.993999446Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:36:16.994153 env[1759]: time="2025-05-17T00:36:16.994023746Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:36:16.994153 env[1759]: time="2025-05-17T00:36:16.994035846Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:36:17.001803 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3084751556-merged.mount: Deactivated successfully. May 17 00:36:17.564146 env[1759]: time="2025-05-17T00:36:17.564100777Z" level=info msg="Loading containers: start." May 17 00:36:17.595000 audit[1795]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.595000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff672fad00 a2=0 a3=7fff672facec items=0 ppid=1759 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.595000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 17 00:36:17.597000 audit[1797]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.597000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffff21cd360 a2=0 a3=7ffff21cd34c items=0 ppid=1759 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.597000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 17 00:36:17.599000 audit[1799]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.599000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe765be930 a2=0 a3=7ffe765be91c items=0 ppid=1759 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.599000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:36:17.601000 audit[1801]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.601000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc9997f6d0 a2=0 a3=7ffc9997f6bc items=0 ppid=1759 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.601000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:36:17.603000 audit[1803]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.603000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdb87156d0 a2=0 a3=7ffdb87156bc items=0 ppid=1759 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.603000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 17 00:36:17.605000 audit[1805]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_register_rule pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.605000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffb991f6e0 a2=0 a3=7fffb991f6cc items=0 ppid=1759 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.605000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 17 00:36:17.621000 audit[1807]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.621000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff91ebd5b0 a2=0 a3=7fff91ebd59c items=0 ppid=1759 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.621000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 17 00:36:17.623000 audit[1809]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.623000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff81896fb0 a2=0 a3=7fff81896f9c items=0 ppid=1759 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.623000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 17 00:36:17.625000 audit[1811]: NETFILTER_CFG table=filter:17 family=2 entries=2 op=nft_register_chain pid=1811 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.625000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc3764c420 a2=0 a3=7ffc3764c40c items=0 ppid=1759 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.625000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:36:17.641000 audit[1815]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_unregister_rule pid=1815 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.641000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc0060d320 a2=0 a3=7ffc0060d30c items=0 ppid=1759 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.641000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:36:17.645000 audit[1816]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.645000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe489712f0 a2=0 a3=7ffe489712dc items=0 ppid=1759 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.645000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:36:17.662781 kernel: Initializing XFRM netlink socket May 17 00:36:17.675139 env[1759]: time="2025-05-17T00:36:17.675098283Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 17 00:36:17.708000 audit[1824]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.708000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffdd3d213a0 a2=0 a3=7ffdd3d2138c items=0 ppid=1759 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.708000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 17 00:36:17.720000 audit[1827]: NETFILTER_CFG table=nat:21 family=2 entries=1 op=nft_register_rule pid=1827 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.720000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffdd6c81b20 a2=0 a3=7ffdd6c81b0c items=0 ppid=1759 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.720000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 17 00:36:17.723000 audit[1830]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1830 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.723000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe273877b0 a2=0 a3=7ffe2738779c items=0 ppid=1759 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.723000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 17 00:36:17.725000 audit[1832]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.725000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffaaf59210 a2=0 a3=7fffaaf591fc items=0 ppid=1759 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.725000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 17 00:36:17.728000 audit[1834]: NETFILTER_CFG table=nat:24 family=2 entries=2 op=nft_register_chain pid=1834 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.728000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffea07b34c0 a2=0 a3=7ffea07b34ac items=0 ppid=1759 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.728000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 17 00:36:17.730000 audit[1836]: NETFILTER_CFG table=nat:25 family=2 entries=2 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.730000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff18b21960 a2=0 a3=7fff18b2194c items=0 ppid=1759 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.730000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 17 00:36:17.732000 audit[1838]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1838 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.732000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffcd27a5a40 a2=0 a3=7ffcd27a5a2c items=0 ppid=1759 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.732000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 17 00:36:17.734000 audit[1840]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1840 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.734000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff00557cd0 a2=0 a3=7fff00557cbc items=0 ppid=1759 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.734000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 17 00:36:17.736000 audit[1842]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1842 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.736000 audit[1842]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc7a062330 a2=0 a3=7ffc7a06231c items=0 ppid=1759 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.736000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:36:17.738000 audit[1844]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1844 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.738000 audit[1844]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffef58dca00 a2=0 a3=7ffef58dc9ec items=0 ppid=1759 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.738000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:36:17.740000 audit[1846]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1846 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.740000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffb23c4a30 a2=0 a3=7fffb23c4a1c items=0 ppid=1759 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.740000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 17 00:36:17.742748 systemd-networkd[1573]: docker0: Link UP May 17 00:36:17.758000 audit[1850]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_unregister_rule pid=1850 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.758000 audit[1850]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe6f03d790 a2=0 a3=7ffe6f03d77c items=0 ppid=1759 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.758000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:36:17.763000 audit[1851]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1851 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:17.763000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff8fccc900 a2=0 a3=7fff8fccc8ec items=0 ppid=1759 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:17.763000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:36:17.766206 env[1759]: time="2025-05-17T00:36:17.766166362Z" level=info msg="Loading containers: done." May 17 00:36:17.778607 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3600593594-merged.mount: Deactivated successfully. May 17 00:36:17.835457 env[1759]: time="2025-05-17T00:36:17.835406203Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 17 00:36:17.835682 env[1759]: time="2025-05-17T00:36:17.835633905Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 17 00:36:17.835879 env[1759]: time="2025-05-17T00:36:17.835812406Z" level=info msg="Daemon has completed initialization" May 17 00:36:17.878128 systemd[1]: Started docker.service. May 17 00:36:17.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:17.884524 env[1759]: time="2025-05-17T00:36:17.884466215Z" level=info msg="API listen on /run/docker.sock" May 17 00:36:18.924749 update_engine[1409]: I0517 00:36:18.924659 1409 update_attempter.cc:509] Updating boot flags... May 17 00:36:19.435691 env[1418]: time="2025-05-17T00:36:19.435623653Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.9\"" May 17 00:36:20.192799 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount30875121.mount: Deactivated successfully. May 17 00:36:21.946494 env[1418]: time="2025-05-17T00:36:21.946434506Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:21.953825 env[1418]: time="2025-05-17T00:36:21.953783942Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0c19e0eafbdfffa1317cf99a16478265a4cd746ef677de27b0be6a8b515f36b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:21.958434 env[1418]: time="2025-05-17T00:36:21.958395365Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:21.963806 env[1418]: time="2025-05-17T00:36:21.963773691Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5b68f0df22013422dc8fb9ddfcff513eb6fc92f9dbf8aae41555c895efef5a20,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:21.964423 env[1418]: time="2025-05-17T00:36:21.964393394Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.9\" returns image reference \"sha256:0c19e0eafbdfffa1317cf99a16478265a4cd746ef677de27b0be6a8b515f36b1\"" May 17 00:36:21.965174 env[1418]: time="2025-05-17T00:36:21.965148098Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.9\"" May 17 00:36:23.652889 env[1418]: time="2025-05-17T00:36:23.652831400Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:23.663318 env[1418]: time="2025-05-17T00:36:23.663279945Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6aa3d581404ae6ae5dc355cb750aaedec843d2c99263d28fce50277e8e2a6ec2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:23.672465 env[1418]: time="2025-05-17T00:36:23.672431884Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:23.678264 env[1418]: time="2025-05-17T00:36:23.678230109Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:be9e7987d323b38a12e28436cff6d6ec6fc31ffdd3ea11eaa9d74852e9d31248,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:23.678880 env[1418]: time="2025-05-17T00:36:23.678849612Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.9\" returns image reference \"sha256:6aa3d581404ae6ae5dc355cb750aaedec843d2c99263d28fce50277e8e2a6ec2\"" May 17 00:36:23.679552 env[1418]: time="2025-05-17T00:36:23.679527515Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.9\"" May 17 00:36:25.180595 env[1418]: time="2025-05-17T00:36:25.180539038Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:25.186469 env[1418]: time="2025-05-17T00:36:25.186393960Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:737ed3eafaf27a28ea9e13b736011bfed5bd349785ac6bc220b34eaf4adc51e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:25.190990 env[1418]: time="2025-05-17T00:36:25.190878077Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:25.195689 env[1418]: time="2025-05-17T00:36:25.195658695Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:eb358c7346bb17ab2c639c3ff8ab76a147dec7ae609f5c0c2800233e42253ed1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:25.196438 env[1418]: time="2025-05-17T00:36:25.196406998Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.9\" returns image reference \"sha256:737ed3eafaf27a28ea9e13b736011bfed5bd349785ac6bc220b34eaf4adc51e3\"" May 17 00:36:25.197166 env[1418]: time="2025-05-17T00:36:25.197140201Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.9\"" May 17 00:36:26.538268 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1830501431.mount: Deactivated successfully. May 17 00:36:27.083985 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. May 17 00:36:27.084227 systemd[1]: Stopped kubelet.service. May 17 00:36:27.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:27.088042 kernel: kauditd_printk_skb: 88 callbacks suppressed May 17 00:36:27.088121 kernel: audit: type=1130 audit(1747442187.082:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:27.097839 systemd[1]: Starting kubelet.service... May 17 00:36:27.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:27.111778 kernel: audit: type=1131 audit(1747442187.082:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:27.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:27.222723 systemd[1]: Started kubelet.service. May 17 00:36:27.236774 kernel: audit: type=1130 audit(1747442187.221:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:27.260389 kubelet[1928]: E0517 00:36:27.260354 1928 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:36:27.261867 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:36:27.262028 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:36:27.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:36:27.273774 kernel: audit: type=1131 audit(1747442187.260:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:36:27.938408 env[1418]: time="2025-05-17T00:36:27.938348141Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:27.946233 env[1418]: time="2025-05-17T00:36:27.946055867Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:27.950909 env[1418]: time="2025-05-17T00:36:27.950750583Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:27.954981 env[1418]: time="2025-05-17T00:36:27.954951697Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fdf026cf2434537e499e9c739d189ca8fc57101d929ac5ccd8e24f979a9738c1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:27.955379 env[1418]: time="2025-05-17T00:36:27.955347698Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.9\" returns image reference \"sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578\"" May 17 00:36:27.956129 env[1418]: time="2025-05-17T00:36:27.956101500Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 17 00:36:28.592891 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1211414331.mount: Deactivated successfully. May 17 00:36:29.985123 env[1418]: time="2025-05-17T00:36:29.985064567Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:29.991240 env[1418]: time="2025-05-17T00:36:29.991198185Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:29.996444 env[1418]: time="2025-05-17T00:36:29.996413700Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:30.000731 env[1418]: time="2025-05-17T00:36:30.000694913Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:30.001404 env[1418]: time="2025-05-17T00:36:30.001371915Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" May 17 00:36:30.002100 env[1418]: time="2025-05-17T00:36:30.002074917Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 17 00:36:30.574658 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1965222564.mount: Deactivated successfully. May 17 00:36:30.599293 env[1418]: time="2025-05-17T00:36:30.599244478Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:30.607420 env[1418]: time="2025-05-17T00:36:30.607381961Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:30.612212 env[1418]: time="2025-05-17T00:36:30.612174110Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:30.619402 env[1418]: time="2025-05-17T00:36:30.619352883Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:30.619950 env[1418]: time="2025-05-17T00:36:30.619911189Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 17 00:36:30.620745 env[1418]: time="2025-05-17T00:36:30.620719297Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 17 00:36:31.302135 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4175466025.mount: Deactivated successfully. May 17 00:36:34.006664 env[1418]: time="2025-05-17T00:36:34.006608393Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:34.013737 env[1418]: time="2025-05-17T00:36:34.013694132Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:34.017422 env[1418]: time="2025-05-17T00:36:34.017391661Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:34.022900 env[1418]: time="2025-05-17T00:36:34.022869700Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:34.023614 env[1418]: time="2025-05-17T00:36:34.023582044Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" May 17 00:36:36.920419 systemd[1]: Stopped kubelet.service. May 17 00:36:36.935081 kernel: audit: type=1130 audit(1747442196.920:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:36.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:36.923005 systemd[1]: Starting kubelet.service... May 17 00:36:36.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:36.949873 kernel: audit: type=1131 audit(1747442196.920:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:36.976653 systemd[1]: Reloading. May 17 00:36:37.087378 /usr/lib/systemd/system-generators/torcx-generator[1978]: time="2025-05-17T00:36:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:36:37.098052 /usr/lib/systemd/system-generators/torcx-generator[1978]: time="2025-05-17T00:36:37Z" level=info msg="torcx already run" May 17 00:36:37.191252 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:36:37.191272 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:36:37.207802 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:36:37.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.299876 kernel: audit: type=1400 audit(1747442197.274:269): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.299980 kernel: audit: type=1400 audit(1747442197.274:270): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.311892 kernel: audit: type=1400 audit(1747442197.274:271): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.324711 kernel: audit: type=1400 audit(1747442197.274:272): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.349327 kernel: audit: type=1400 audit(1747442197.274:273): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.349438 kernel: audit: type=1400 audit(1747442197.274:274): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.361521 kernel: audit: type=1400 audit(1747442197.274:275): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.373746 kernel: audit: type=1400 audit(1747442197.274:276): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.299000 audit: BPF prog-id=44 op=LOAD May 17 00:36:37.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.311000 audit: BPF prog-id=45 op=LOAD May 17 00:36:37.311000 audit: BPF prog-id=27 op=UNLOAD May 17 00:36:37.311000 audit: BPF prog-id=28 op=UNLOAD May 17 00:36:37.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.348000 audit: BPF prog-id=46 op=LOAD May 17 00:36:37.348000 audit: BPF prog-id=29 op=UNLOAD May 17 00:36:37.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.360000 audit: BPF prog-id=47 op=LOAD May 17 00:36:37.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.360000 audit: BPF prog-id=48 op=LOAD May 17 00:36:37.360000 audit: BPF prog-id=30 op=UNLOAD May 17 00:36:37.360000 audit: BPF prog-id=31 op=UNLOAD May 17 00:36:37.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.373000 audit: BPF prog-id=49 op=LOAD May 17 00:36:37.373000 audit: BPF prog-id=41 op=UNLOAD May 17 00:36:37.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit: BPF prog-id=50 op=LOAD May 17 00:36:37.376000 audit: BPF prog-id=38 op=UNLOAD May 17 00:36:37.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit: BPF prog-id=51 op=LOAD May 17 00:36:37.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.376000 audit: BPF prog-id=52 op=LOAD May 17 00:36:37.376000 audit: BPF prog-id=39 op=UNLOAD May 17 00:36:37.376000 audit: BPF prog-id=40 op=UNLOAD May 17 00:36:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit: BPF prog-id=53 op=LOAD May 17 00:36:37.379000 audit: BPF prog-id=32 op=UNLOAD May 17 00:36:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit: BPF prog-id=54 op=LOAD May 17 00:36:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.379000 audit: BPF prog-id=55 op=LOAD May 17 00:36:37.379000 audit: BPF prog-id=33 op=UNLOAD May 17 00:36:37.379000 audit: BPF prog-id=34 op=UNLOAD May 17 00:36:37.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.381000 audit: BPF prog-id=56 op=LOAD May 17 00:36:37.381000 audit: BPF prog-id=37 op=UNLOAD May 17 00:36:37.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.382000 audit: BPF prog-id=57 op=LOAD May 17 00:36:37.382000 audit: BPF prog-id=43 op=UNLOAD May 17 00:36:37.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:37.383000 audit: BPF prog-id=58 op=LOAD May 17 00:36:37.383000 audit: BPF prog-id=36 op=UNLOAD May 17 00:36:37.402181 systemd[1]: Started kubelet.service. May 17 00:36:37.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:37.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:37.407109 systemd[1]: Stopping kubelet.service... May 17 00:36:37.407522 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:36:37.407732 systemd[1]: Stopped kubelet.service. May 17 00:36:37.409524 systemd[1]: Starting kubelet.service... May 17 00:36:37.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:37.734563 systemd[1]: Started kubelet.service. May 17 00:36:37.771680 kubelet[2051]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:36:37.772042 kubelet[2051]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 17 00:36:37.772042 kubelet[2051]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:36:37.772231 kubelet[2051]: I0517 00:36:37.772137 2051 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:36:38.176593 kubelet[2051]: I0517 00:36:38.176549 2051 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" May 17 00:36:38.176593 kubelet[2051]: I0517 00:36:38.176579 2051 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:36:38.177201 kubelet[2051]: I0517 00:36:38.176970 2051 server.go:934] "Client rotation is on, will bootstrap in background" May 17 00:36:38.642353 kubelet[2051]: E0517 00:36:38.642098 2051 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.200.4.20:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.200.4.20:6443: connect: connection refused" logger="UnhandledError" May 17 00:36:38.648152 kubelet[2051]: I0517 00:36:38.648101 2051 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:36:38.676227 kubelet[2051]: E0517 00:36:38.676191 2051 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:36:38.676227 kubelet[2051]: I0517 00:36:38.676222 2051 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:36:38.680989 kubelet[2051]: I0517 00:36:38.680963 2051 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:36:38.681115 kubelet[2051]: I0517 00:36:38.681080 2051 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 17 00:36:38.681256 kubelet[2051]: I0517 00:36:38.681217 2051 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:36:38.681447 kubelet[2051]: I0517 00:36:38.681253 2051 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-cef16a74b5","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:36:38.681588 kubelet[2051]: I0517 00:36:38.681460 2051 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:36:38.681588 kubelet[2051]: I0517 00:36:38.681473 2051 container_manager_linux.go:300] "Creating device plugin manager" May 17 00:36:38.681681 kubelet[2051]: I0517 00:36:38.681601 2051 state_mem.go:36] "Initialized new in-memory state store" May 17 00:36:38.687168 kubelet[2051]: I0517 00:36:38.687143 2051 kubelet.go:408] "Attempting to sync node with API server" May 17 00:36:38.687249 kubelet[2051]: I0517 00:36:38.687177 2051 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:36:38.687249 kubelet[2051]: I0517 00:36:38.687219 2051 kubelet.go:314] "Adding apiserver pod source" May 17 00:36:38.687249 kubelet[2051]: I0517 00:36:38.687238 2051 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:36:38.687524 kubelet[2051]: W0517 00:36:38.687470 2051 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.4.20:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-cef16a74b5&limit=500&resourceVersion=0": dial tcp 10.200.4.20:6443: connect: connection refused May 17 00:36:38.687608 kubelet[2051]: E0517 00:36:38.687542 2051 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.4.20:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-cef16a74b5&limit=500&resourceVersion=0\": dial tcp 10.200.4.20:6443: connect: connection refused" logger="UnhandledError" May 17 00:36:38.690387 kubelet[2051]: W0517 00:36:38.690347 2051 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.4.20:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.4.20:6443: connect: connection refused May 17 00:36:38.690543 kubelet[2051]: E0517 00:36:38.690524 2051 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.4.20:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.4.20:6443: connect: connection refused" logger="UnhandledError" May 17 00:36:38.690702 kubelet[2051]: I0517 00:36:38.690685 2051 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:36:38.691302 kubelet[2051]: I0517 00:36:38.691281 2051 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:36:38.691458 kubelet[2051]: W0517 00:36:38.691435 2051 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:36:38.707480 kubelet[2051]: I0517 00:36:38.707460 2051 server.go:1274] "Started kubelet" May 17 00:36:38.707000 audit[2051]: AVC avc: denied { mac_admin } for pid=2051 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:38.707000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:36:38.707000 audit[2051]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00091aa50 a1=c000845860 a2=c00091aa20 a3=25 items=0 ppid=1 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:38.707000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:36:38.708000 audit[2051]: AVC avc: denied { mac_admin } for pid=2051 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:38.708000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:36:38.708000 audit[2051]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00084f6e0 a1=c000845878 a2=c00091aae0 a3=25 items=0 ppid=1 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:38.708000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:36:38.709326 kubelet[2051]: I0517 00:36:38.708780 2051 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:36:38.709326 kubelet[2051]: I0517 00:36:38.708827 2051 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 17 00:36:38.709326 kubelet[2051]: I0517 00:36:38.708908 2051 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:36:38.711000 audit[2062]: NETFILTER_CFG table=mangle:33 family=2 entries=2 op=nft_register_chain pid=2062 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:38.711000 audit[2062]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdd7a7a1e0 a2=0 a3=7ffdd7a7a1cc items=0 ppid=2051 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:38.711000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:36:38.712000 audit[2063]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=2063 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:38.712000 audit[2063]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd71183040 a2=0 a3=7ffd7118302c items=0 ppid=2051 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:38.712000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:36:38.714862 kubelet[2051]: I0517 00:36:38.714825 2051 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:36:38.715574 kubelet[2051]: I0517 00:36:38.715549 2051 server.go:449] "Adding debug handlers to kubelet server" May 17 00:36:38.719578 kubelet[2051]: I0517 00:36:38.719546 2051 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:36:38.719774 kubelet[2051]: I0517 00:36:38.719742 2051 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:36:38.720785 kubelet[2051]: I0517 00:36:38.719972 2051 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:36:38.721067 kubelet[2051]: E0517 00:36:38.718628 2051 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.4.20:6443/api/v1/namespaces/default/events\": dial tcp 10.200.4.20:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.7-n-cef16a74b5.1840296bdf7be62a default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-cef16a74b5,UID:ci-3510.3.7-n-cef16a74b5,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-cef16a74b5,},FirstTimestamp:2025-05-17 00:36:38.707430954 +0000 UTC m=+0.967348797,LastTimestamp:2025-05-17 00:36:38.707430954 +0000 UTC m=+0.967348797,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-cef16a74b5,}" May 17 00:36:38.721295 kubelet[2051]: E0517 00:36:38.721280 2051 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-cef16a74b5\" not found" May 17 00:36:38.721416 kubelet[2051]: I0517 00:36:38.721404 2051 volume_manager.go:289] "Starting Kubelet Volume Manager" May 17 00:36:38.721698 kubelet[2051]: I0517 00:36:38.721682 2051 desired_state_of_world_populator.go:147] "Desired state populator starts to run" May 17 00:36:38.721852 kubelet[2051]: I0517 00:36:38.721840 2051 reconciler.go:26] "Reconciler: start to sync state" May 17 00:36:38.722298 kubelet[2051]: W0517 00:36:38.722255 2051 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.4.20:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.4.20:6443: connect: connection refused May 17 00:36:38.722432 kubelet[2051]: E0517 00:36:38.722412 2051 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.4.20:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.4.20:6443: connect: connection refused" logger="UnhandledError" May 17 00:36:38.724225 kubelet[2051]: E0517 00:36:38.724200 2051 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:36:38.724826 kubelet[2051]: I0517 00:36:38.724808 2051 factory.go:221] Registration of the containerd container factory successfully May 17 00:36:38.724955 kubelet[2051]: I0517 00:36:38.724944 2051 factory.go:221] Registration of the systemd container factory successfully May 17 00:36:38.725091 kubelet[2051]: I0517 00:36:38.725074 2051 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:36:38.725000 audit[2065]: NETFILTER_CFG table=filter:35 family=2 entries=2 op=nft_register_chain pid=2065 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:38.725000 audit[2065]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd12bfd680 a2=0 a3=7ffd12bfd66c items=0 ppid=2051 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:38.725000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:36:38.727000 audit[2067]: NETFILTER_CFG table=filter:36 family=2 entries=2 op=nft_register_chain pid=2067 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:38.727000 audit[2067]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff65d9d610 a2=0 a3=7fff65d9d5fc items=0 ppid=2051 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:38.727000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:36:38.744000 audit[2070]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_rule pid=2070 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:38.744000 audit[2070]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffdf3a30430 a2=0 a3=7ffdf3a3041c items=0 ppid=2051 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:38.744000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:36:38.745583 kubelet[2051]: E0517 00:36:38.745532 2051 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.20:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-cef16a74b5?timeout=10s\": dial tcp 10.200.4.20:6443: connect: connection refused" interval="200ms" May 17 00:36:38.745675 kubelet[2051]: I0517 00:36:38.745644 2051 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:36:38.746000 audit[2074]: NETFILTER_CFG table=mangle:38 family=10 entries=2 op=nft_register_chain pid=2074 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:38.746000 audit[2074]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffee62fc090 a2=0 a3=7ffee62fc07c items=0 ppid=2051 pid=2074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:38.746000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:36:38.749791 kubelet[2051]: I0517 00:36:38.749750 2051 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:36:38.749865 kubelet[2051]: I0517 00:36:38.749796 2051 status_manager.go:217] "Starting to sync pod status with apiserver" May 17 00:36:38.749865 kubelet[2051]: I0517 00:36:38.749817 2051 kubelet.go:2321] "Starting kubelet main sync loop" May 17 00:36:38.749959 kubelet[2051]: E0517 00:36:38.749860 2051 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:36:38.750000 audit[2075]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2075 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:38.750000 audit[2075]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc6dbbea0 a2=0 a3=7fffc6dbbe8c items=0 ppid=2051 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:38.750000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:36:38.752623 kubelet[2051]: W0517 00:36:38.752574 2051 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.4.20:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.4.20:6443: connect: connection refused May 17 00:36:38.751000 audit[2079]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2079 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:38.751000 audit[2079]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff6e763a0 a2=0 a3=7ffff6e7638c items=0 ppid=2051 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:38.751000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:36:38.753074 kubelet[2051]: E0517 00:36:38.753044 2051 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.4.20:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.4.20:6443: connect: connection refused" logger="UnhandledError" May 17 00:36:38.753000 audit[2080]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2080 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:38.753000 audit[2080]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6adfa620 a2=0 a3=7ffe6adfa60c items=0 ppid=2051 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:38.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:36:38.753000 audit[2077]: NETFILTER_CFG table=mangle:42 family=10 entries=1 op=nft_register_chain pid=2077 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:38.753000 audit[2077]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd17848490 a2=0 a3=7ffd1784847c items=0 ppid=2051 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:38.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:36:38.754000 audit[2081]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=2081 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:38.754000 audit[2081]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc4e7e1660 a2=0 a3=7ffc4e7e164c items=0 ppid=2051 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:38.754000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:36:38.755000 audit[2082]: NETFILTER_CFG table=filter:44 family=10 entries=2 op=nft_register_chain pid=2082 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:38.755000 audit[2082]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff6bdf7610 a2=0 a3=7fff6bdf75fc items=0 ppid=2051 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:38.755000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:36:38.783263 kubelet[2051]: I0517 00:36:38.783233 2051 cpu_manager.go:214] "Starting CPU manager" policy="none" May 17 00:36:38.783263 kubelet[2051]: I0517 00:36:38.783255 2051 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 17 00:36:38.783776 kubelet[2051]: I0517 00:36:38.783278 2051 state_mem.go:36] "Initialized new in-memory state store" May 17 00:36:38.795191 kubelet[2051]: I0517 00:36:38.795136 2051 policy_none.go:49] "None policy: Start" May 17 00:36:38.796094 kubelet[2051]: I0517 00:36:38.796078 2051 memory_manager.go:170] "Starting memorymanager" policy="None" May 17 00:36:38.796184 kubelet[2051]: I0517 00:36:38.796109 2051 state_mem.go:35] "Initializing new in-memory state store" May 17 00:36:38.819664 systemd[1]: Created slice kubepods.slice. May 17 00:36:38.821469 kubelet[2051]: E0517 00:36:38.821445 2051 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-cef16a74b5\" not found" May 17 00:36:38.824316 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:36:38.827108 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:36:38.834379 kubelet[2051]: I0517 00:36:38.834350 2051 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:36:38.833000 audit[2051]: AVC avc: denied { mac_admin } for pid=2051 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:38.833000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:36:38.833000 audit[2051]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d43ec0 a1=c00074bc08 a2=c000d43e90 a3=25 items=0 ppid=1 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:38.833000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:36:38.834699 kubelet[2051]: I0517 00:36:38.834435 2051 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:36:38.834699 kubelet[2051]: I0517 00:36:38.834555 2051 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:36:38.834699 kubelet[2051]: I0517 00:36:38.834569 2051 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:36:38.835270 kubelet[2051]: I0517 00:36:38.835256 2051 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:36:38.836344 kubelet[2051]: E0517 00:36:38.836328 2051 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.7-n-cef16a74b5\" not found" May 17 00:36:38.858306 systemd[1]: Created slice kubepods-burstable-podc52252df4aef33eeddc9e6795541968e.slice. May 17 00:36:38.859846 kubelet[2051]: W0517 00:36:38.859825 2051 helpers.go:245] readString: Failed to read "/sys/fs/cgroup/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-podc52252df4aef33eeddc9e6795541968e.slice/cpuset.cpus.effective": read /sys/fs/cgroup/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-podc52252df4aef33eeddc9e6795541968e.slice/cpuset.cpus.effective: no such device May 17 00:36:38.867986 systemd[1]: Created slice kubepods-burstable-podf4385090046571cb2aae926d39408952.slice. May 17 00:36:38.872403 systemd[1]: Created slice kubepods-burstable-podadb0278c65c64073b2b1871ac5696d90.slice. May 17 00:36:38.923157 kubelet[2051]: I0517 00:36:38.922954 2051 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c52252df4aef33eeddc9e6795541968e-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-cef16a74b5\" (UID: \"c52252df4aef33eeddc9e6795541968e\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-cef16a74b5" May 17 00:36:38.936172 kubelet[2051]: I0517 00:36:38.936144 2051 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-cef16a74b5" May 17 00:36:38.936538 kubelet[2051]: E0517 00:36:38.936510 2051 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.4.20:6443/api/v1/nodes\": dial tcp 10.200.4.20:6443: connect: connection refused" node="ci-3510.3.7-n-cef16a74b5" May 17 00:36:38.946888 kubelet[2051]: E0517 00:36:38.946854 2051 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.20:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-cef16a74b5?timeout=10s\": dial tcp 10.200.4.20:6443: connect: connection refused" interval="400ms" May 17 00:36:39.023371 kubelet[2051]: I0517 00:36:39.023301 2051 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f4385090046571cb2aae926d39408952-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-cef16a74b5\" (UID: \"f4385090046571cb2aae926d39408952\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-cef16a74b5" May 17 00:36:39.023371 kubelet[2051]: I0517 00:36:39.023371 2051 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/adb0278c65c64073b2b1871ac5696d90-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-cef16a74b5\" (UID: \"adb0278c65c64073b2b1871ac5696d90\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-cef16a74b5" May 17 00:36:39.023648 kubelet[2051]: I0517 00:36:39.023406 2051 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c52252df4aef33eeddc9e6795541968e-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-cef16a74b5\" (UID: \"c52252df4aef33eeddc9e6795541968e\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-cef16a74b5" May 17 00:36:39.023648 kubelet[2051]: I0517 00:36:39.023433 2051 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c52252df4aef33eeddc9e6795541968e-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-cef16a74b5\" (UID: \"c52252df4aef33eeddc9e6795541968e\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-cef16a74b5" May 17 00:36:39.023648 kubelet[2051]: I0517 00:36:39.023458 2051 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f4385090046571cb2aae926d39408952-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-cef16a74b5\" (UID: \"f4385090046571cb2aae926d39408952\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-cef16a74b5" May 17 00:36:39.023648 kubelet[2051]: I0517 00:36:39.023483 2051 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/f4385090046571cb2aae926d39408952-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-cef16a74b5\" (UID: \"f4385090046571cb2aae926d39408952\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-cef16a74b5" May 17 00:36:39.023648 kubelet[2051]: I0517 00:36:39.023564 2051 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f4385090046571cb2aae926d39408952-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-cef16a74b5\" (UID: \"f4385090046571cb2aae926d39408952\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-cef16a74b5" May 17 00:36:39.023919 kubelet[2051]: I0517 00:36:39.023598 2051 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f4385090046571cb2aae926d39408952-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-cef16a74b5\" (UID: \"f4385090046571cb2aae926d39408952\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-cef16a74b5" May 17 00:36:39.138598 kubelet[2051]: I0517 00:36:39.138557 2051 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-cef16a74b5" May 17 00:36:39.138930 kubelet[2051]: E0517 00:36:39.138898 2051 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.4.20:6443/api/v1/nodes\": dial tcp 10.200.4.20:6443: connect: connection refused" node="ci-3510.3.7-n-cef16a74b5" May 17 00:36:39.167316 env[1418]: time="2025-05-17T00:36:39.167265886Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-cef16a74b5,Uid:c52252df4aef33eeddc9e6795541968e,Namespace:kube-system,Attempt:0,}" May 17 00:36:39.172108 env[1418]: time="2025-05-17T00:36:39.172072445Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-cef16a74b5,Uid:f4385090046571cb2aae926d39408952,Namespace:kube-system,Attempt:0,}" May 17 00:36:39.175655 env[1418]: time="2025-05-17T00:36:39.175572934Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-cef16a74b5,Uid:adb0278c65c64073b2b1871ac5696d90,Namespace:kube-system,Attempt:0,}" May 17 00:36:39.348312 kubelet[2051]: E0517 00:36:39.348265 2051 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.20:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-cef16a74b5?timeout=10s\": dial tcp 10.200.4.20:6443: connect: connection refused" interval="800ms" May 17 00:36:39.545308 kubelet[2051]: I0517 00:36:39.545089 2051 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-cef16a74b5" May 17 00:36:39.545573 kubelet[2051]: E0517 00:36:39.545547 2051 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.4.20:6443/api/v1/nodes\": dial tcp 10.200.4.20:6443: connect: connection refused" node="ci-3510.3.7-n-cef16a74b5" May 17 00:36:39.633383 kubelet[2051]: W0517 00:36:39.633317 2051 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.4.20:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.4.20:6443: connect: connection refused May 17 00:36:39.633537 kubelet[2051]: E0517 00:36:39.633388 2051 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.4.20:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.4.20:6443: connect: connection refused" logger="UnhandledError" May 17 00:36:39.814306 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2216700109.mount: Deactivated successfully. May 17 00:36:39.863899 env[1418]: time="2025-05-17T00:36:39.863834734Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:39.869767 env[1418]: time="2025-05-17T00:36:39.869712151Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:39.883244 env[1418]: time="2025-05-17T00:36:39.883194778Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:39.888977 env[1418]: time="2025-05-17T00:36:39.888941888Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:39.893777 env[1418]: time="2025-05-17T00:36:39.893735746Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:39.897806 kubelet[2051]: W0517 00:36:39.897733 2051 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.4.20:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.4.20:6443: connect: connection refused May 17 00:36:39.898131 kubelet[2051]: E0517 00:36:39.897836 2051 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.4.20:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.4.20:6443: connect: connection refused" logger="UnhandledError" May 17 00:36:39.899829 env[1418]: time="2025-05-17T00:36:39.899798873Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:39.904141 env[1418]: time="2025-05-17T00:36:39.904106805Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:39.909795 env[1418]: time="2025-05-17T00:36:39.909750009Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:39.923630 kubelet[2051]: W0517 00:36:39.923574 2051 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.4.20:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.4.20:6443: connect: connection refused May 17 00:36:39.923786 kubelet[2051]: E0517 00:36:39.923641 2051 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.4.20:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.4.20:6443: connect: connection refused" logger="UnhandledError" May 17 00:36:39.927905 env[1418]: time="2025-05-17T00:36:39.927862086Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:39.937347 env[1418]: time="2025-05-17T00:36:39.937295994Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:39.954985 env[1418]: time="2025-05-17T00:36:39.954937045Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:39.982146 env[1418]: time="2025-05-17T00:36:39.982091409Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:40.029598 env[1418]: time="2025-05-17T00:36:40.023884430Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:40.029598 env[1418]: time="2025-05-17T00:36:40.023936133Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:40.029598 env[1418]: time="2025-05-17T00:36:40.023954234Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:40.029598 env[1418]: time="2025-05-17T00:36:40.024338554Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e22ef369cc051846b4cbedab921468d3c29142009a22177dd80464710606ebdb pid=2091 runtime=io.containerd.runc.v2 May 17 00:36:40.052150 env[1418]: time="2025-05-17T00:36:40.052047307Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:40.052150 env[1418]: time="2025-05-17T00:36:40.052116211Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:40.053904 env[1418]: time="2025-05-17T00:36:40.052129512Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:40.053904 env[1418]: time="2025-05-17T00:36:40.052433628Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d872055481c4b8d9491aebd93cdd94bfec1eba8a7f69c585d38c1276b8e127a5 pid=2107 runtime=io.containerd.runc.v2 May 17 00:36:40.064161 systemd[1]: Started cri-containerd-e22ef369cc051846b4cbedab921468d3c29142009a22177dd80464710606ebdb.scope. May 17 00:36:40.090968 systemd[1]: Started cri-containerd-d872055481c4b8d9491aebd93cdd94bfec1eba8a7f69c585d38c1276b8e127a5.scope. May 17 00:36:40.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.093000 audit: BPF prog-id=59 op=LOAD May 17 00:36:40.094000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.094000 audit[2114]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2091 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532326566333639636330353138343662346362656461623932313436 May 17 00:36:40.094000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.094000 audit[2114]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2091 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532326566333639636330353138343662346362656461623932313436 May 17 00:36:40.094000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.094000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.094000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.094000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.094000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.094000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.094000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.094000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.094000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.094000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.094000 audit: BPF prog-id=60 op=LOAD May 17 00:36:40.094000 audit[2114]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021fef0 items=0 ppid=2091 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532326566333639636330353138343662346362656461623932313436 May 17 00:36:40.095000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.095000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.095000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.095000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.095000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.095000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.095000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.095000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.095000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.095000 audit: BPF prog-id=61 op=LOAD May 17 00:36:40.095000 audit[2114]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021ff38 items=0 ppid=2091 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532326566333639636330353138343662346362656461623932313436 May 17 00:36:40.095000 audit: BPF prog-id=61 op=UNLOAD May 17 00:36:40.095000 audit: BPF prog-id=60 op=UNLOAD May 17 00:36:40.095000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.095000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.095000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.095000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.095000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.095000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.095000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.095000 audit[2114]: AVC avc: denied { perfmon } for pid=2114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.095000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.095000 audit[2114]: AVC avc: denied { bpf } for pid=2114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.095000 audit: BPF prog-id=62 op=LOAD May 17 00:36:40.095000 audit[2114]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00040a348 items=0 ppid=2091 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532326566333639636330353138343662346362656461623932313436 May 17 00:36:40.109057 env[1418]: time="2025-05-17T00:36:40.108980294Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:40.109244 env[1418]: time="2025-05-17T00:36:40.109220206Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:40.109362 env[1418]: time="2025-05-17T00:36:40.109340613Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:40.109606 env[1418]: time="2025-05-17T00:36:40.109570925Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/747e75cebcab3e4c924be4f8841fb99d21d251c14074cde77432ba413b762d5c pid=2152 runtime=io.containerd.runc.v2 May 17 00:36:40.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.112000 audit: BPF prog-id=63 op=LOAD May 17 00:36:40.113000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.113000 audit[2125]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2107 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438373230353534383163346238643934393161656264393363646439 May 17 00:36:40.113000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.113000 audit[2125]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2107 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438373230353534383163346238643934393161656264393363646439 May 17 00:36:40.114000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.114000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.114000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.114000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.114000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.114000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.114000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.114000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.114000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.114000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.114000 audit: BPF prog-id=64 op=LOAD May 17 00:36:40.114000 audit[2125]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ccf60 items=0 ppid=2107 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438373230353534383163346238643934393161656264393363646439 May 17 00:36:40.114000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.114000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.114000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.114000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.114000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.114000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.114000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.114000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.114000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.114000 audit: BPF prog-id=65 op=LOAD May 17 00:36:40.114000 audit[2125]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ccfa8 items=0 ppid=2107 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438373230353534383163346238643934393161656264393363646439 May 17 00:36:40.115000 audit: BPF prog-id=65 op=UNLOAD May 17 00:36:40.115000 audit: BPF prog-id=64 op=UNLOAD May 17 00:36:40.115000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.115000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.115000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.115000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.115000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.115000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.115000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.115000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.115000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.115000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.115000 audit: BPF prog-id=66 op=LOAD May 17 00:36:40.115000 audit[2125]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003cd3b8 items=0 ppid=2107 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438373230353534383163346238643934393161656264393363646439 May 17 00:36:40.128353 systemd[1]: Started cri-containerd-747e75cebcab3e4c924be4f8841fb99d21d251c14074cde77432ba413b762d5c.scope. May 17 00:36:40.130475 kubelet[2051]: W0517 00:36:40.130373 2051 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.4.20:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-cef16a74b5&limit=500&resourceVersion=0": dial tcp 10.200.4.20:6443: connect: connection refused May 17 00:36:40.130475 kubelet[2051]: E0517 00:36:40.130439 2051 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.4.20:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-cef16a74b5&limit=500&resourceVersion=0\": dial tcp 10.200.4.20:6443: connect: connection refused" logger="UnhandledError" May 17 00:36:40.149223 kubelet[2051]: E0517 00:36:40.149146 2051 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.20:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-cef16a74b5?timeout=10s\": dial tcp 10.200.4.20:6443: connect: connection refused" interval="1.6s" May 17 00:36:40.175181 env[1418]: time="2025-05-17T00:36:40.175141864Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-cef16a74b5,Uid:f4385090046571cb2aae926d39408952,Namespace:kube-system,Attempt:0,} returns sandbox id \"e22ef369cc051846b4cbedab921468d3c29142009a22177dd80464710606ebdb\"" May 17 00:36:40.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.177000 audit: BPF prog-id=67 op=LOAD May 17 00:36:40.179000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.179000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2152 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734376537356365626361623365346339323462653466383834316662 May 17 00:36:40.179000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.179000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2152 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734376537356365626361623365346339323462653466383834316662 May 17 00:36:40.179000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.179000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.179000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.179000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.179000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.179000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.179000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.179000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.179000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.179000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.179000 audit: BPF prog-id=68 op=LOAD May 17 00:36:40.179000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002844e0 items=0 ppid=2152 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734376537356365626361623365346339323462653466383834316662 May 17 00:36:40.181617 env[1418]: time="2025-05-17T00:36:40.181561301Z" level=info msg="CreateContainer within sandbox \"e22ef369cc051846b4cbedab921468d3c29142009a22177dd80464710606ebdb\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 17 00:36:40.180000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.180000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.180000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.180000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.180000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.180000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.180000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.180000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.180000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.180000 audit: BPF prog-id=69 op=LOAD May 17 00:36:40.180000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000284528 items=0 ppid=2152 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734376537356365626361623365346339323462653466383834316662 May 17 00:36:40.181000 audit: BPF prog-id=69 op=UNLOAD May 17 00:36:40.181000 audit: BPF prog-id=68 op=UNLOAD May 17 00:36:40.182000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.182000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.182000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.182000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.182000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.182000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.182000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.182000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.182000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.182000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.182000 audit: BPF prog-id=70 op=LOAD May 17 00:36:40.182000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000284938 items=0 ppid=2152 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734376537356365626361623365346339323462653466383834316662 May 17 00:36:40.188998 env[1418]: time="2025-05-17T00:36:40.188946788Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-cef16a74b5,Uid:c52252df4aef33eeddc9e6795541968e,Namespace:kube-system,Attempt:0,} returns sandbox id \"d872055481c4b8d9491aebd93cdd94bfec1eba8a7f69c585d38c1276b8e127a5\"" May 17 00:36:40.191967 env[1418]: time="2025-05-17T00:36:40.191930545Z" level=info msg="CreateContainer within sandbox \"d872055481c4b8d9491aebd93cdd94bfec1eba8a7f69c585d38c1276b8e127a5\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 17 00:36:40.218046 env[1418]: time="2025-05-17T00:36:40.218009013Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-cef16a74b5,Uid:adb0278c65c64073b2b1871ac5696d90,Namespace:kube-system,Attempt:0,} returns sandbox id \"747e75cebcab3e4c924be4f8841fb99d21d251c14074cde77432ba413b762d5c\"" May 17 00:36:40.220383 env[1418]: time="2025-05-17T00:36:40.220353636Z" level=info msg="CreateContainer within sandbox \"747e75cebcab3e4c924be4f8841fb99d21d251c14074cde77432ba413b762d5c\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 17 00:36:40.246720 env[1418]: time="2025-05-17T00:36:40.246661616Z" level=info msg="CreateContainer within sandbox \"e22ef369cc051846b4cbedab921468d3c29142009a22177dd80464710606ebdb\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"45503b778bfe49613402c51b592f759ce620c22ba735d1b9a87553d3f64335b7\"" May 17 00:36:40.247472 env[1418]: time="2025-05-17T00:36:40.247443257Z" level=info msg="StartContainer for \"45503b778bfe49613402c51b592f759ce620c22ba735d1b9a87553d3f64335b7\"" May 17 00:36:40.265434 systemd[1]: Started cri-containerd-45503b778bfe49613402c51b592f759ce620c22ba735d1b9a87553d3f64335b7.scope. May 17 00:36:40.267912 env[1418]: time="2025-05-17T00:36:40.267861928Z" level=info msg="CreateContainer within sandbox \"d872055481c4b8d9491aebd93cdd94bfec1eba8a7f69c585d38c1276b8e127a5\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"f28b7bf3e764e3cb6224a92ef6ae13e27566abbd4370269370b4d3aeac3afa2a\"" May 17 00:36:40.268783 env[1418]: time="2025-05-17T00:36:40.268738374Z" level=info msg="StartContainer for \"f28b7bf3e764e3cb6224a92ef6ae13e27566abbd4370269370b4d3aeac3afa2a\"" May 17 00:36:40.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.286000 audit: BPF prog-id=71 op=LOAD May 17 00:36:40.288000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.288000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2091 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435353033623737386266653439363133343032633531623539326637 May 17 00:36:40.288000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.288000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2091 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435353033623737386266653439363133343032633531623539326637 May 17 00:36:40.288000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.288000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.288000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.288000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.288000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.288000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.288000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.288000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.288000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.288000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.288000 audit: BPF prog-id=72 op=LOAD May 17 00:36:40.288000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000236f00 items=0 ppid=2091 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435353033623737386266653439363133343032633531623539326637 May 17 00:36:40.289000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.289000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.289000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.289000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.289000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.289000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.289000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.289000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.289000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.289000 audit: BPF prog-id=73 op=LOAD May 17 00:36:40.289000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000236f48 items=0 ppid=2091 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435353033623737386266653439363133343032633531623539326637 May 17 00:36:40.290000 audit: BPF prog-id=73 op=UNLOAD May 17 00:36:40.290000 audit: BPF prog-id=72 op=UNLOAD May 17 00:36:40.290000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.290000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.290000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.290000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.290000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.290000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.290000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.290000 audit[2220]: AVC avc: denied { perfmon } for pid=2220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.290000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.290000 audit[2220]: AVC avc: denied { bpf } for pid=2220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.290000 audit: BPF prog-id=74 op=LOAD May 17 00:36:40.290000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000237358 items=0 ppid=2091 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435353033623737386266653439363133343032633531623539326637 May 17 00:36:40.296853 systemd[1]: Started cri-containerd-f28b7bf3e764e3cb6224a92ef6ae13e27566abbd4370269370b4d3aeac3afa2a.scope. May 17 00:36:40.300351 env[1418]: time="2025-05-17T00:36:40.300298529Z" level=info msg="CreateContainer within sandbox \"747e75cebcab3e4c924be4f8841fb99d21d251c14074cde77432ba413b762d5c\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"884354602f61ce7bbad53f0ce385612956641015dc1155a063e6af46de478c31\"" May 17 00:36:40.301390 env[1418]: time="2025-05-17T00:36:40.301354985Z" level=info msg="StartContainer for \"884354602f61ce7bbad53f0ce385612956641015dc1155a063e6af46de478c31\"" May 17 00:36:40.323507 systemd[1]: Started cri-containerd-884354602f61ce7bbad53f0ce385612956641015dc1155a063e6af46de478c31.scope. May 17 00:36:40.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.347000 audit: BPF prog-id=75 op=LOAD May 17 00:36:40.349000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.349000 audit[2245]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2107 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632386237626633653736346533636236323234613932656636616531 May 17 00:36:40.350000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.350000 audit[2245]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2107 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632386237626633653736346533636236323234613932656636616531 May 17 00:36:40.350000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.350000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.352604 kubelet[2051]: I0517 00:36:40.351598 2051 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-cef16a74b5" May 17 00:36:40.352604 kubelet[2051]: E0517 00:36:40.352028 2051 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.4.20:6443/api/v1/nodes\": dial tcp 10.200.4.20:6443: connect: connection refused" node="ci-3510.3.7-n-cef16a74b5" May 17 00:36:40.350000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.350000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.350000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.350000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.350000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.350000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.350000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.350000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.350000 audit: BPF prog-id=76 op=LOAD May 17 00:36:40.350000 audit[2245]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000219060 items=0 ppid=2107 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632386237626633653736346533636236323234613932656636616531 May 17 00:36:40.353000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.353000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.353000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.353000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.353000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.353000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.353000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.353000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.353000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.353000 audit: BPF prog-id=77 op=LOAD May 17 00:36:40.353000 audit[2245]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002190a8 items=0 ppid=2107 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632386237626633653736346533636236323234613932656636616531 May 17 00:36:40.354000 audit: BPF prog-id=77 op=UNLOAD May 17 00:36:40.354000 audit: BPF prog-id=76 op=UNLOAD May 17 00:36:40.354000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.354000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.354000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.354000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.354000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.354000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.354000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.354000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.354000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.354000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.354000 audit: BPF prog-id=78 op=LOAD May 17 00:36:40.354000 audit[2245]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002194b8 items=0 ppid=2107 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632386237626633653736346533636236323234613932656636616531 May 17 00:36:40.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.369000 audit: BPF prog-id=79 op=LOAD May 17 00:36:40.370000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2152 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838343335343630326636316365376262616435336630636533383536 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2152 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838343335343630326636316365376262616435336630636533383536 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit: BPF prog-id=80 op=LOAD May 17 00:36:40.370000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000d5cf0 items=0 ppid=2152 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838343335343630326636316365376262616435336630636533383536 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit: BPF prog-id=81 op=LOAD May 17 00:36:40.370000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000d5d38 items=0 ppid=2152 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838343335343630326636316365376262616435336630636533383536 May 17 00:36:40.370000 audit: BPF prog-id=81 op=UNLOAD May 17 00:36:40.370000 audit: BPF prog-id=80 op=UNLOAD May 17 00:36:40.370000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:40.370000 audit: BPF prog-id=82 op=LOAD May 17 00:36:40.370000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e8148 items=0 ppid=2152 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838343335343630326636316365376262616435336630636533383536 May 17 00:36:40.388331 env[1418]: time="2025-05-17T00:36:40.388274744Z" level=info msg="StartContainer for \"45503b778bfe49613402c51b592f759ce620c22ba735d1b9a87553d3f64335b7\" returns successfully" May 17 00:36:40.480301 env[1418]: time="2025-05-17T00:36:40.480247168Z" level=info msg="StartContainer for \"f28b7bf3e764e3cb6224a92ef6ae13e27566abbd4370269370b4d3aeac3afa2a\" returns successfully" May 17 00:36:40.496808 env[1418]: time="2025-05-17T00:36:40.496699031Z" level=info msg="StartContainer for \"884354602f61ce7bbad53f0ce385612956641015dc1155a063e6af46de478c31\" returns successfully" May 17 00:36:41.577000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:41.577000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000bfc090 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:36:41.577000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:41.579000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:41.579000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000438c20 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:36:41.579000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:41.954549 kubelet[2051]: I0517 00:36:41.954511 2051 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-cef16a74b5" May 17 00:36:42.503969 kernel: kauditd_printk_skb: 563 callbacks suppressed May 17 00:36:42.504160 kernel: audit: type=1400 audit(1747442202.483:569): avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:42.483000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:42.483000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:42.524941 kernel: audit: type=1400 audit(1747442202.483:570): avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:42.483000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00465a9c0 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:36:42.566999 kernel: audit: type=1300 audit(1747442202.483:570): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00465a9c0 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:36:42.483000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:42.584816 kernel: audit: type=1327 audit(1747442202.483:570): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:42.483000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c002ada4e0 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:36:42.605896 kernel: audit: type=1300 audit(1747442202.483:569): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c002ada4e0 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:36:42.483000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:42.642054 kernel: audit: type=1327 audit(1747442202.483:569): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:42.642206 kernel: audit: type=1400 audit(1747442202.504:571): avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:42.504000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:42.504000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c001c96ec0 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:36:42.504000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:42.680321 kernel: audit: type=1300 audit(1747442202.504:571): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c001c96ec0 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:36:42.680439 kernel: audit: type=1327 audit(1747442202.504:571): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:42.686256 kubelet[2051]: E0517 00:36:42.686228 2051 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.7-n-cef16a74b5\" not found" node="ci-3510.3.7-n-cef16a74b5" May 17 00:36:42.505000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:42.707789 kernel: audit: type=1400 audit(1747442202.505:572): avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:42.505000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=53 a1=c0027428d0 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:36:42.505000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:42.545000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:42.545000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c0049194c0 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:36:42.545000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:42.545000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:42.545000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c002796d50 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:36:42.545000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:43.425957 kubelet[2051]: I0517 00:36:43.425911 2051 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510.3.7-n-cef16a74b5" May 17 00:36:43.426400 kubelet[2051]: E0517 00:36:43.425968 2051 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"ci-3510.3.7-n-cef16a74b5\": node \"ci-3510.3.7-n-cef16a74b5\" not found" May 17 00:36:43.682580 kubelet[2051]: W0517 00:36:43.682441 2051 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:36:43.690091 kubelet[2051]: I0517 00:36:43.690054 2051 apiserver.go:52] "Watching apiserver" May 17 00:36:43.722911 kubelet[2051]: I0517 00:36:43.722862 2051 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" May 17 00:36:44.855079 systemd[1]: Reloading. May 17 00:36:44.950338 /usr/lib/systemd/system-generators/torcx-generator[2345]: time="2025-05-17T00:36:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:36:44.950828 /usr/lib/systemd/system-generators/torcx-generator[2345]: time="2025-05-17T00:36:44Z" level=info msg="torcx already run" May 17 00:36:45.044660 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:36:45.044680 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:36:45.061506 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:36:45.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.142000 audit: BPF prog-id=83 op=LOAD May 17 00:36:45.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.142000 audit: BPF prog-id=84 op=LOAD May 17 00:36:45.142000 audit: BPF prog-id=44 op=UNLOAD May 17 00:36:45.142000 audit: BPF prog-id=45 op=UNLOAD May 17 00:36:45.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.144000 audit: BPF prog-id=85 op=LOAD May 17 00:36:45.144000 audit: BPF prog-id=46 op=UNLOAD May 17 00:36:45.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.144000 audit: BPF prog-id=86 op=LOAD May 17 00:36:45.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.145000 audit: BPF prog-id=87 op=LOAD May 17 00:36:45.145000 audit: BPF prog-id=47 op=UNLOAD May 17 00:36:45.145000 audit: BPF prog-id=48 op=UNLOAD May 17 00:36:45.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.146000 audit: BPF prog-id=88 op=LOAD May 17 00:36:45.146000 audit: BPF prog-id=49 op=UNLOAD May 17 00:36:45.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.147000 audit: BPF prog-id=89 op=LOAD May 17 00:36:45.147000 audit: BPF prog-id=71 op=UNLOAD May 17 00:36:45.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.150000 audit: BPF prog-id=90 op=LOAD May 17 00:36:45.150000 audit: BPF prog-id=50 op=UNLOAD May 17 00:36:45.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.150000 audit: BPF prog-id=91 op=LOAD May 17 00:36:45.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.150000 audit: BPF prog-id=92 op=LOAD May 17 00:36:45.150000 audit: BPF prog-id=51 op=UNLOAD May 17 00:36:45.150000 audit: BPF prog-id=52 op=UNLOAD May 17 00:36:45.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.152000 audit: BPF prog-id=93 op=LOAD May 17 00:36:45.152000 audit: BPF prog-id=59 op=UNLOAD May 17 00:36:45.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit: BPF prog-id=94 op=LOAD May 17 00:36:45.154000 audit: BPF prog-id=53 op=UNLOAD May 17 00:36:45.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit: BPF prog-id=95 op=LOAD May 17 00:36:45.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit: BPF prog-id=96 op=LOAD May 17 00:36:45.154000 audit: BPF prog-id=54 op=UNLOAD May 17 00:36:45.154000 audit: BPF prog-id=55 op=UNLOAD May 17 00:36:45.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.155000 audit: BPF prog-id=97 op=LOAD May 17 00:36:45.155000 audit: BPF prog-id=79 op=UNLOAD May 17 00:36:45.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.156000 audit: BPF prog-id=98 op=LOAD May 17 00:36:45.156000 audit: BPF prog-id=75 op=UNLOAD May 17 00:36:45.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.156000 audit: BPF prog-id=99 op=LOAD May 17 00:36:45.156000 audit: BPF prog-id=67 op=UNLOAD May 17 00:36:45.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.159000 audit: BPF prog-id=100 op=LOAD May 17 00:36:45.159000 audit: BPF prog-id=56 op=UNLOAD May 17 00:36:45.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.159000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.159000 audit: BPF prog-id=101 op=LOAD May 17 00:36:45.159000 audit: BPF prog-id=57 op=UNLOAD May 17 00:36:45.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.160000 audit: BPF prog-id=102 op=LOAD May 17 00:36:45.160000 audit: BPF prog-id=58 op=UNLOAD May 17 00:36:45.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:45.162000 audit: BPF prog-id=103 op=LOAD May 17 00:36:45.162000 audit: BPF prog-id=63 op=UNLOAD May 17 00:36:45.178930 systemd[1]: Stopping kubelet.service... May 17 00:36:45.204101 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:36:45.204321 systemd[1]: Stopped kubelet.service. May 17 00:36:45.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:45.206495 systemd[1]: Starting kubelet.service... May 17 00:36:45.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:45.341069 systemd[1]: Started kubelet.service. May 17 00:36:46.000940 kubelet[2411]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:36:46.000940 kubelet[2411]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 17 00:36:46.000940 kubelet[2411]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:36:46.000940 kubelet[2411]: I0517 00:36:45.939901 2411 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:36:46.000940 kubelet[2411]: I0517 00:36:45.945413 2411 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" May 17 00:36:46.000940 kubelet[2411]: I0517 00:36:45.945432 2411 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:36:46.000940 kubelet[2411]: I0517 00:36:45.945597 2411 server.go:934] "Client rotation is on, will bootstrap in background" May 17 00:36:46.000940 kubelet[2411]: I0517 00:36:45.997075 2411 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 17 00:36:46.000940 kubelet[2411]: I0517 00:36:46.000286 2411 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:36:46.005809 kubelet[2411]: E0517 00:36:46.005778 2411 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:36:46.005809 kubelet[2411]: I0517 00:36:46.005807 2411 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:36:46.011498 kubelet[2411]: I0517 00:36:46.011472 2411 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:36:46.011620 kubelet[2411]: I0517 00:36:46.011584 2411 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 17 00:36:46.011744 kubelet[2411]: I0517 00:36:46.011703 2411 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:36:46.011972 kubelet[2411]: I0517 00:36:46.011741 2411 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-cef16a74b5","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:36:46.012107 kubelet[2411]: I0517 00:36:46.011984 2411 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:36:46.012107 kubelet[2411]: I0517 00:36:46.011997 2411 container_manager_linux.go:300] "Creating device plugin manager" May 17 00:36:46.012107 kubelet[2411]: I0517 00:36:46.012028 2411 state_mem.go:36] "Initialized new in-memory state store" May 17 00:36:46.012286 kubelet[2411]: I0517 00:36:46.012137 2411 kubelet.go:408] "Attempting to sync node with API server" May 17 00:36:46.012286 kubelet[2411]: I0517 00:36:46.012154 2411 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:36:46.012286 kubelet[2411]: I0517 00:36:46.012190 2411 kubelet.go:314] "Adding apiserver pod source" May 17 00:36:46.012286 kubelet[2411]: I0517 00:36:46.012204 2411 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:36:46.021000 audit[2411]: AVC avc: denied { mac_admin } for pid=2411 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.021000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:36:46.021000 audit[2411]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0000589f0 a1=c000151ea8 a2=c000058930 a3=25 items=0 ppid=1 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:46.021000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:36:46.021000 audit[2411]: AVC avc: denied { mac_admin } for pid=2411 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.021000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:36:46.021000 audit[2411]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004097a0 a1=c000151ec0 a2=c000058c30 a3=25 items=0 ppid=1 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:46.021000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:36:46.023178 kubelet[2411]: I0517 00:36:46.019670 2411 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:36:46.023178 kubelet[2411]: I0517 00:36:46.020148 2411 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:36:46.023178 kubelet[2411]: I0517 00:36:46.020579 2411 server.go:1274] "Started kubelet" May 17 00:36:46.023178 kubelet[2411]: I0517 00:36:46.022550 2411 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:36:46.023178 kubelet[2411]: I0517 00:36:46.022622 2411 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 17 00:36:46.023178 kubelet[2411]: I0517 00:36:46.022663 2411 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:36:46.038544 kubelet[2411]: I0517 00:36:46.038504 2411 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:36:46.041798 kubelet[2411]: I0517 00:36:46.041734 2411 server.go:449] "Adding debug handlers to kubelet server" May 17 00:36:46.047820 kubelet[2411]: I0517 00:36:46.047787 2411 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:36:46.048765 kubelet[2411]: I0517 00:36:46.048424 2411 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:36:46.051642 kubelet[2411]: I0517 00:36:46.051129 2411 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:36:46.053735 kubelet[2411]: I0517 00:36:46.053010 2411 volume_manager.go:289] "Starting Kubelet Volume Manager" May 17 00:36:46.055316 kubelet[2411]: I0517 00:36:46.054359 2411 desired_state_of_world_populator.go:147] "Desired state populator starts to run" May 17 00:36:46.055316 kubelet[2411]: I0517 00:36:46.054483 2411 reconciler.go:26] "Reconciler: start to sync state" May 17 00:36:46.060878 kubelet[2411]: I0517 00:36:46.060582 2411 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:36:46.063206 kubelet[2411]: E0517 00:36:46.061833 2411 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:36:46.066628 kubelet[2411]: I0517 00:36:46.065648 2411 factory.go:221] Registration of the containerd container factory successfully May 17 00:36:46.066628 kubelet[2411]: I0517 00:36:46.065664 2411 factory.go:221] Registration of the systemd container factory successfully May 17 00:36:46.081080 kubelet[2411]: I0517 00:36:46.081037 2411 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:36:46.083481 kubelet[2411]: I0517 00:36:46.083139 2411 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:36:46.083481 kubelet[2411]: I0517 00:36:46.083165 2411 status_manager.go:217] "Starting to sync pod status with apiserver" May 17 00:36:46.083481 kubelet[2411]: I0517 00:36:46.083185 2411 kubelet.go:2321] "Starting kubelet main sync loop" May 17 00:36:46.083481 kubelet[2411]: E0517 00:36:46.083234 2411 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:36:46.124820 kubelet[2411]: I0517 00:36:46.124796 2411 cpu_manager.go:214] "Starting CPU manager" policy="none" May 17 00:36:46.125000 kubelet[2411]: I0517 00:36:46.124988 2411 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 17 00:36:46.125078 kubelet[2411]: I0517 00:36:46.125069 2411 state_mem.go:36] "Initialized new in-memory state store" May 17 00:36:46.125309 kubelet[2411]: I0517 00:36:46.125291 2411 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 17 00:36:46.125454 kubelet[2411]: I0517 00:36:46.125417 2411 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 17 00:36:46.125454 kubelet[2411]: I0517 00:36:46.125452 2411 policy_none.go:49] "None policy: Start" May 17 00:36:46.126456 kubelet[2411]: I0517 00:36:46.126094 2411 memory_manager.go:170] "Starting memorymanager" policy="None" May 17 00:36:46.126456 kubelet[2411]: I0517 00:36:46.126120 2411 state_mem.go:35] "Initializing new in-memory state store" May 17 00:36:46.126456 kubelet[2411]: I0517 00:36:46.126285 2411 state_mem.go:75] "Updated machine memory state" May 17 00:36:46.132000 audit[2411]: AVC avc: denied { mac_admin } for pid=2411 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:46.132000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:36:46.132000 audit[2411]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00074dad0 a1=c000fac798 a2=c00074daa0 a3=25 items=0 ppid=1 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:46.132000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:36:46.133697 kubelet[2411]: I0517 00:36:46.133063 2411 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:36:46.133697 kubelet[2411]: I0517 00:36:46.133132 2411 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:36:46.133697 kubelet[2411]: I0517 00:36:46.133302 2411 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:36:46.133697 kubelet[2411]: I0517 00:36:46.133314 2411 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:36:46.134129 kubelet[2411]: I0517 00:36:46.133955 2411 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:36:46.196910 kubelet[2411]: W0517 00:36:46.196863 2411 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:36:46.197172 kubelet[2411]: W0517 00:36:46.196863 2411 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:36:46.197285 kubelet[2411]: E0517 00:36:46.197265 2411 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.7-n-cef16a74b5\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.7-n-cef16a74b5" May 17 00:36:46.198662 kubelet[2411]: W0517 00:36:46.198616 2411 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:36:46.248247 kubelet[2411]: I0517 00:36:46.248215 2411 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-cef16a74b5" May 17 00:36:46.257336 kubelet[2411]: I0517 00:36:46.257226 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f4385090046571cb2aae926d39408952-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-cef16a74b5\" (UID: \"f4385090046571cb2aae926d39408952\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-cef16a74b5" May 17 00:36:46.257336 kubelet[2411]: I0517 00:36:46.257271 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f4385090046571cb2aae926d39408952-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-cef16a74b5\" (UID: \"f4385090046571cb2aae926d39408952\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-cef16a74b5" May 17 00:36:46.257550 kubelet[2411]: I0517 00:36:46.257390 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/adb0278c65c64073b2b1871ac5696d90-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-cef16a74b5\" (UID: \"adb0278c65c64073b2b1871ac5696d90\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-cef16a74b5" May 17 00:36:46.257550 kubelet[2411]: I0517 00:36:46.257418 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c52252df4aef33eeddc9e6795541968e-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-cef16a74b5\" (UID: \"c52252df4aef33eeddc9e6795541968e\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-cef16a74b5" May 17 00:36:46.257550 kubelet[2411]: I0517 00:36:46.257440 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c52252df4aef33eeddc9e6795541968e-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-cef16a74b5\" (UID: \"c52252df4aef33eeddc9e6795541968e\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-cef16a74b5" May 17 00:36:46.257678 kubelet[2411]: I0517 00:36:46.257556 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f4385090046571cb2aae926d39408952-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-cef16a74b5\" (UID: \"f4385090046571cb2aae926d39408952\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-cef16a74b5" May 17 00:36:46.257678 kubelet[2411]: I0517 00:36:46.257583 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/f4385090046571cb2aae926d39408952-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-cef16a74b5\" (UID: \"f4385090046571cb2aae926d39408952\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-cef16a74b5" May 17 00:36:46.257775 kubelet[2411]: I0517 00:36:46.257700 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f4385090046571cb2aae926d39408952-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-cef16a74b5\" (UID: \"f4385090046571cb2aae926d39408952\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-cef16a74b5" May 17 00:36:46.257775 kubelet[2411]: I0517 00:36:46.257734 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c52252df4aef33eeddc9e6795541968e-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-cef16a74b5\" (UID: \"c52252df4aef33eeddc9e6795541968e\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-cef16a74b5" May 17 00:36:46.260672 kubelet[2411]: I0517 00:36:46.260639 2411 kubelet_node_status.go:111] "Node was previously registered" node="ci-3510.3.7-n-cef16a74b5" May 17 00:36:46.260820 kubelet[2411]: I0517 00:36:46.260709 2411 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510.3.7-n-cef16a74b5" May 17 00:36:46.767000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7404 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:36:46.767000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000749cc0 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:36:46.767000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:47.019570 kubelet[2411]: I0517 00:36:47.019457 2411 apiserver.go:52] "Watching apiserver" May 17 00:36:47.055350 kubelet[2411]: I0517 00:36:47.055254 2411 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" May 17 00:36:47.116201 kubelet[2411]: W0517 00:36:47.116173 2411 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:36:47.116405 kubelet[2411]: E0517 00:36:47.116253 2411 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.7-n-cef16a74b5\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.7-n-cef16a74b5" May 17 00:36:47.124684 kubelet[2411]: I0517 00:36:47.124630 2411 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.7-n-cef16a74b5" podStartSLOduration=1.124609959 podStartE2EDuration="1.124609959s" podCreationTimestamp="2025-05-17 00:36:46 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:36:47.124017133 +0000 UTC m=+1.775962843" watchObservedRunningTime="2025-05-17 00:36:47.124609959 +0000 UTC m=+1.776555669" May 17 00:36:47.125053 kubelet[2411]: I0517 00:36:47.124992 2411 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.7-n-cef16a74b5" podStartSLOduration=4.124976375 podStartE2EDuration="4.124976375s" podCreationTimestamp="2025-05-17 00:36:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:36:47.108646565 +0000 UTC m=+1.760592275" watchObservedRunningTime="2025-05-17 00:36:47.124976375 +0000 UTC m=+1.776922185" May 17 00:36:47.134434 kubelet[2411]: I0517 00:36:47.134379 2411 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-cef16a74b5" podStartSLOduration=1.134362083 podStartE2EDuration="1.134362083s" podCreationTimestamp="2025-05-17 00:36:46 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:36:47.134183776 +0000 UTC m=+1.786129586" watchObservedRunningTime="2025-05-17 00:36:47.134362083 +0000 UTC m=+1.786307893" May 17 00:36:49.385000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:49.391204 kernel: kauditd_printk_skb: 269 callbacks suppressed May 17 00:36:49.391305 kernel: audit: type=1400 audit(1747442209.385:825): avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:49.386000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:49.419053 kernel: audit: type=1400 audit(1747442209.386:826): avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:49.386000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a80d60 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:36:49.438296 kernel: audit: type=1300 audit(1747442209.386:826): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a80d60 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:36:49.386000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:49.453636 kernel: audit: type=1327 audit(1747442209.386:826): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:49.387000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:49.387000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a80de0 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:36:49.487891 kernel: audit: type=1400 audit(1747442209.387:827): avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:49.487988 kernel: audit: type=1300 audit(1747442209.387:827): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a80de0 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:36:49.488023 kernel: audit: type=1327 audit(1747442209.387:827): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:49.387000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:49.387000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:49.517520 kernel: audit: type=1400 audit(1747442209.387:828): avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:49.387000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a80e20 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:36:49.387000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:49.551553 kernel: audit: type=1300 audit(1747442209.387:828): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a80e20 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:36:49.551644 kernel: audit: type=1327 audit(1747442209.387:828): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:49.385000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000439920 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:36:49.385000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:51.435484 kubelet[2411]: I0517 00:36:51.435438 2411 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 17 00:36:51.436090 env[1418]: time="2025-05-17T00:36:51.435931292Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:36:51.436479 kubelet[2411]: I0517 00:36:51.436201 2411 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 17 00:36:52.375673 systemd[1]: Created slice kubepods-besteffort-podcd18bea6_bd75_4a13_b357_8120b46fab4e.slice. May 17 00:36:52.402279 kubelet[2411]: I0517 00:36:52.402247 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/cd18bea6-bd75-4a13-b357-8120b46fab4e-kube-proxy\") pod \"kube-proxy-8bhgx\" (UID: \"cd18bea6-bd75-4a13-b357-8120b46fab4e\") " pod="kube-system/kube-proxy-8bhgx" May 17 00:36:52.402439 kubelet[2411]: I0517 00:36:52.402282 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x4d68\" (UniqueName: \"kubernetes.io/projected/cd18bea6-bd75-4a13-b357-8120b46fab4e-kube-api-access-x4d68\") pod \"kube-proxy-8bhgx\" (UID: \"cd18bea6-bd75-4a13-b357-8120b46fab4e\") " pod="kube-system/kube-proxy-8bhgx" May 17 00:36:52.402439 kubelet[2411]: I0517 00:36:52.402314 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cd18bea6-bd75-4a13-b357-8120b46fab4e-lib-modules\") pod \"kube-proxy-8bhgx\" (UID: \"cd18bea6-bd75-4a13-b357-8120b46fab4e\") " pod="kube-system/kube-proxy-8bhgx" May 17 00:36:52.402439 kubelet[2411]: I0517 00:36:52.402334 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cd18bea6-bd75-4a13-b357-8120b46fab4e-xtables-lock\") pod \"kube-proxy-8bhgx\" (UID: \"cd18bea6-bd75-4a13-b357-8120b46fab4e\") " pod="kube-system/kube-proxy-8bhgx" May 17 00:36:52.489579 systemd[1]: Created slice kubepods-besteffort-pod54890783_1060_41b1_8a9a_e0df643e2a77.slice. May 17 00:36:52.503263 kubelet[2411]: I0517 00:36:52.503222 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rt47s\" (UniqueName: \"kubernetes.io/projected/54890783-1060-41b1-8a9a-e0df643e2a77-kube-api-access-rt47s\") pod \"tigera-operator-7c5755cdcb-gx8qq\" (UID: \"54890783-1060-41b1-8a9a-e0df643e2a77\") " pod="tigera-operator/tigera-operator-7c5755cdcb-gx8qq" May 17 00:36:52.504151 kubelet[2411]: I0517 00:36:52.504117 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/54890783-1060-41b1-8a9a-e0df643e2a77-var-lib-calico\") pod \"tigera-operator-7c5755cdcb-gx8qq\" (UID: \"54890783-1060-41b1-8a9a-e0df643e2a77\") " pod="tigera-operator/tigera-operator-7c5755cdcb-gx8qq" May 17 00:36:52.522274 kubelet[2411]: I0517 00:36:52.522243 2411 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:36:52.683907 env[1418]: time="2025-05-17T00:36:52.683373313Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8bhgx,Uid:cd18bea6-bd75-4a13-b357-8120b46fab4e,Namespace:kube-system,Attempt:0,}" May 17 00:36:52.717796 env[1418]: time="2025-05-17T00:36:52.717708325Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:52.717796 env[1418]: time="2025-05-17T00:36:52.717766927Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:52.718034 env[1418]: time="2025-05-17T00:36:52.717781228Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:52.723729 env[1418]: time="2025-05-17T00:36:52.718162242Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/52c296ddf0be798fd468efac42b149cbe979a31ccfedb62fd3f7299cc55def76 pid=2462 runtime=io.containerd.runc.v2 May 17 00:36:52.740813 systemd[1]: Started cri-containerd-52c296ddf0be798fd468efac42b149cbe979a31ccfedb62fd3f7299cc55def76.scope. May 17 00:36:52.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit: BPF prog-id=104 op=LOAD May 17 00:36:52.750000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2462 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:52.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532633239366464663062653739386664343638656661633432623134 May 17 00:36:52.750000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2462 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:52.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532633239366464663062653739386664343638656661633432623134 May 17 00:36:52.750000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.750000 audit: BPF prog-id=105 op=LOAD May 17 00:36:52.750000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dee70 items=0 ppid=2462 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:52.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532633239366464663062653739386664343638656661633432623134 May 17 00:36:52.751000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.751000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.751000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.751000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.751000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.751000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.751000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.751000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.751000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.751000 audit: BPF prog-id=106 op=LOAD May 17 00:36:52.751000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001deeb8 items=0 ppid=2462 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:52.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532633239366464663062653739386664343638656661633432623134 May 17 00:36:52.751000 audit: BPF prog-id=106 op=UNLOAD May 17 00:36:52.751000 audit: BPF prog-id=105 op=UNLOAD May 17 00:36:52.751000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.751000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.751000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.751000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.751000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.751000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.751000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.751000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.751000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.751000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.751000 audit: BPF prog-id=107 op=LOAD May 17 00:36:52.751000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001df2c8 items=0 ppid=2462 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:52.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532633239366464663062653739386664343638656661633432623134 May 17 00:36:52.766650 env[1418]: time="2025-05-17T00:36:52.766613994Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8bhgx,Uid:cd18bea6-bd75-4a13-b357-8120b46fab4e,Namespace:kube-system,Attempt:0,} returns sandbox id \"52c296ddf0be798fd468efac42b149cbe979a31ccfedb62fd3f7299cc55def76\"" May 17 00:36:52.769894 env[1418]: time="2025-05-17T00:36:52.769842817Z" level=info msg="CreateContainer within sandbox \"52c296ddf0be798fd468efac42b149cbe979a31ccfedb62fd3f7299cc55def76\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:36:52.797461 env[1418]: time="2025-05-17T00:36:52.797429071Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7c5755cdcb-gx8qq,Uid:54890783-1060-41b1-8a9a-e0df643e2a77,Namespace:tigera-operator,Attempt:0,}" May 17 00:36:52.813431 env[1418]: time="2025-05-17T00:36:52.813380180Z" level=info msg="CreateContainer within sandbox \"52c296ddf0be798fd468efac42b149cbe979a31ccfedb62fd3f7299cc55def76\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"61b1546f76ef291c670561648a2189b81c1a4610c3ee46ffcd1d3505e4ed5761\"" May 17 00:36:52.815390 env[1418]: time="2025-05-17T00:36:52.815356356Z" level=info msg="StartContainer for \"61b1546f76ef291c670561648a2189b81c1a4610c3ee46ffcd1d3505e4ed5761\"" May 17 00:36:52.834679 systemd[1]: Started cri-containerd-61b1546f76ef291c670561648a2189b81c1a4610c3ee46ffcd1d3505e4ed5761.scope. May 17 00:36:52.853000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fdd06172588 items=0 ppid=2462 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:52.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631623135343666373665663239316336373035363136343861323138 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit: BPF prog-id=108 op=LOAD May 17 00:36:52.853000 audit[2504]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003e0158 items=0 ppid=2462 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:52.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631623135343666373665663239316336373035363136343861323138 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit: BPF prog-id=109 op=LOAD May 17 00:36:52.853000 audit[2504]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003e01a8 items=0 ppid=2462 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:52.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631623135343666373665663239316336373035363136343861323138 May 17 00:36:52.853000 audit: BPF prog-id=109 op=UNLOAD May 17 00:36:52.853000 audit: BPF prog-id=108 op=UNLOAD May 17 00:36:52.853000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { perfmon } for pid=2504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit[2504]: AVC avc: denied { bpf } for pid=2504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.853000 audit: BPF prog-id=110 op=LOAD May 17 00:36:52.853000 audit[2504]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003e0238 items=0 ppid=2462 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:52.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631623135343666373665663239316336373035363136343861323138 May 17 00:36:52.862626 env[1418]: time="2025-05-17T00:36:52.862552859Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:52.862785 env[1418]: time="2025-05-17T00:36:52.862605261Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:52.862785 env[1418]: time="2025-05-17T00:36:52.862620862Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:52.863017 env[1418]: time="2025-05-17T00:36:52.862969075Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e1deac7384aced602002dec0da807af80e363b45f9da4bbc63ddca9387e51f0e pid=2528 runtime=io.containerd.runc.v2 May 17 00:36:52.879095 systemd[1]: Started cri-containerd-e1deac7384aced602002dec0da807af80e363b45f9da4bbc63ddca9387e51f0e.scope. May 17 00:36:52.896253 env[1418]: time="2025-05-17T00:36:52.896205645Z" level=info msg="StartContainer for \"61b1546f76ef291c670561648a2189b81c1a4610c3ee46ffcd1d3505e4ed5761\" returns successfully" May 17 00:36:52.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.909000 audit: BPF prog-id=111 op=LOAD May 17 00:36:52.910000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2528 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:52.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531646561633733383461636564363032303032646563306461383037 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2528 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:52.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531646561633733383461636564363032303032646563306461383037 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit: BPF prog-id=112 op=LOAD May 17 00:36:52.910000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024380 items=0 ppid=2528 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:52.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531646561633733383461636564363032303032646563306461383037 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit: BPF prog-id=113 op=LOAD May 17 00:36:52.910000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000243c8 items=0 ppid=2528 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:52.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531646561633733383461636564363032303032646563306461383037 May 17 00:36:52.910000 audit: BPF prog-id=113 op=UNLOAD May 17 00:36:52.910000 audit: BPF prog-id=112 op=UNLOAD May 17 00:36:52.910000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { perfmon } for pid=2545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit[2545]: AVC avc: denied { bpf } for pid=2545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:52.910000 audit: BPF prog-id=114 op=LOAD May 17 00:36:52.910000 audit[2545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000247d8 items=0 ppid=2528 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:52.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531646561633733383461636564363032303032646563306461383037 May 17 00:36:52.951709 env[1418]: time="2025-05-17T00:36:52.951597561Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7c5755cdcb-gx8qq,Uid:54890783-1060-41b1-8a9a-e0df643e2a77,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"e1deac7384aced602002dec0da807af80e363b45f9da4bbc63ddca9387e51f0e\"" May 17 00:36:52.956398 env[1418]: time="2025-05-17T00:36:52.956365643Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\"" May 17 00:36:53.032000 audit[2605]: NETFILTER_CFG table=mangle:45 family=10 entries=1 op=nft_register_chain pid=2605 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.032000 audit[2605]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6385d710 a2=0 a3=7ffe6385d6fc items=0 ppid=2515 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.032000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:36:53.034000 audit[2606]: NETFILTER_CFG table=mangle:46 family=2 entries=1 op=nft_register_chain pid=2606 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.034000 audit[2606]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc9d256870 a2=0 a3=7ffc9d25685c items=0 ppid=2515 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.034000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:36:53.037000 audit[2609]: NETFILTER_CFG table=nat:47 family=2 entries=1 op=nft_register_chain pid=2609 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.037000 audit[2609]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9e59da90 a2=0 a3=7ffd9e59da7c items=0 ppid=2515 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:36:53.041000 audit[2610]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_chain pid=2610 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.041000 audit[2610]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5be62600 a2=0 a3=7ffc5be625ec items=0 ppid=2515 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:36:53.042000 audit[2608]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=2608 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.042000 audit[2608]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcacc49620 a2=0 a3=7ffcacc4960c items=0 ppid=2515 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.042000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:36:53.044000 audit[2612]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_chain pid=2612 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.044000 audit[2612]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb00048c0 a2=0 a3=7ffcb00048ac items=0 ppid=2515 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.044000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:36:53.137000 audit[2613]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=2613 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.137000 audit[2613]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd3cb5ffd0 a2=0 a3=7ffd3cb5ffbc items=0 ppid=2515 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.137000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:36:53.141000 audit[2615]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=2615 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.141000 audit[2615]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe4ba4cd10 a2=0 a3=7ffe4ba4ccfc items=0 ppid=2515 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.141000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:36:53.145000 audit[2618]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2618 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.145000 audit[2618]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe34bc69d0 a2=0 a3=7ffe34bc69bc items=0 ppid=2515 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.145000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:36:53.148000 audit[2619]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2619 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.148000 audit[2619]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe72f00d10 a2=0 a3=7ffe72f00cfc items=0 ppid=2515 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.148000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:36:53.151000 audit[2621]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2621 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.151000 audit[2621]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffa0320ef0 a2=0 a3=7fffa0320edc items=0 ppid=2515 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.151000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:36:53.152000 audit[2622]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_chain pid=2622 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.152000 audit[2622]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea1deb9e0 a2=0 a3=7ffea1deb9cc items=0 ppid=2515 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.152000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:36:53.155000 audit[2624]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2624 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.155000 audit[2624]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe0aa06200 a2=0 a3=7ffe0aa061ec items=0 ppid=2515 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.155000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:36:53.159000 audit[2627]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2627 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.159000 audit[2627]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffca277f0a0 a2=0 a3=7ffca277f08c items=0 ppid=2515 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.159000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:36:53.161000 audit[2628]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_chain pid=2628 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.161000 audit[2628]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd978ef230 a2=0 a3=7ffd978ef21c items=0 ppid=2515 pid=2628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.161000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:36:53.163000 audit[2630]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2630 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.163000 audit[2630]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe3e6cb640 a2=0 a3=7ffe3e6cb62c items=0 ppid=2515 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.163000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:36:53.165000 audit[2631]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_chain pid=2631 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.165000 audit[2631]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd232387a0 a2=0 a3=7ffd2323878c items=0 ppid=2515 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.165000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:36:53.167000 audit[2633]: NETFILTER_CFG table=filter:62 family=2 entries=1 op=nft_register_rule pid=2633 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.167000 audit[2633]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe2da60010 a2=0 a3=7ffe2da5fffc items=0 ppid=2515 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.167000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:36:53.171000 audit[2636]: NETFILTER_CFG table=filter:63 family=2 entries=1 op=nft_register_rule pid=2636 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.171000 audit[2636]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd21e10440 a2=0 a3=7ffd21e1042c items=0 ppid=2515 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.171000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:36:53.175000 audit[2639]: NETFILTER_CFG table=filter:64 family=2 entries=1 op=nft_register_rule pid=2639 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.175000 audit[2639]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffec4e626f0 a2=0 a3=7ffec4e626dc items=0 ppid=2515 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.175000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:36:53.176000 audit[2640]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_chain pid=2640 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.176000 audit[2640]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffedfbe3580 a2=0 a3=7ffedfbe356c items=0 ppid=2515 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.176000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:36:53.180000 audit[2642]: NETFILTER_CFG table=nat:66 family=2 entries=1 op=nft_register_rule pid=2642 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.180000 audit[2642]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffccf094b00 a2=0 a3=7ffccf094aec items=0 ppid=2515 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.180000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:36:53.183000 audit[2645]: NETFILTER_CFG table=nat:67 family=2 entries=1 op=nft_register_rule pid=2645 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.183000 audit[2645]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd6fac4280 a2=0 a3=7ffd6fac426c items=0 ppid=2515 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.183000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:36:53.185000 audit[2646]: NETFILTER_CFG table=nat:68 family=2 entries=1 op=nft_register_chain pid=2646 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.185000 audit[2646]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeffea3620 a2=0 a3=7ffeffea360c items=0 ppid=2515 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.185000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:36:53.188000 audit[2648]: NETFILTER_CFG table=nat:69 family=2 entries=1 op=nft_register_rule pid=2648 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:53.188000 audit[2648]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fffa5dc08a0 a2=0 a3=7fffa5dc088c items=0 ppid=2515 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.188000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:36:53.222000 audit[2654]: NETFILTER_CFG table=filter:70 family=2 entries=8 op=nft_register_rule pid=2654 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:53.222000 audit[2654]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc56937b60 a2=0 a3=7ffc56937b4c items=0 ppid=2515 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.222000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:53.236000 audit[2654]: NETFILTER_CFG table=nat:71 family=2 entries=14 op=nft_register_chain pid=2654 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:53.236000 audit[2654]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc56937b60 a2=0 a3=7ffc56937b4c items=0 ppid=2515 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.236000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:53.237000 audit[2659]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_chain pid=2659 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.237000 audit[2659]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff89795c00 a2=0 a3=7fff89795bec items=0 ppid=2515 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.237000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:36:53.240000 audit[2661]: NETFILTER_CFG table=filter:73 family=10 entries=2 op=nft_register_chain pid=2661 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.240000 audit[2661]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe410d1a60 a2=0 a3=7ffe410d1a4c items=0 ppid=2515 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.240000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:36:53.244000 audit[2664]: NETFILTER_CFG table=filter:74 family=10 entries=2 op=nft_register_chain pid=2664 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.244000 audit[2664]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdfde5f210 a2=0 a3=7ffdfde5f1fc items=0 ppid=2515 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.244000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:36:53.245000 audit[2665]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2665 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.245000 audit[2665]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5ded1390 a2=0 a3=7ffc5ded137c items=0 ppid=2515 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:36:53.248000 audit[2667]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2667 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.248000 audit[2667]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffb8b93f70 a2=0 a3=7fffb8b93f5c items=0 ppid=2515 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.248000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:36:53.249000 audit[2668]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_chain pid=2668 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.249000 audit[2668]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3aeef470 a2=0 a3=7ffc3aeef45c items=0 ppid=2515 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.249000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:36:53.252000 audit[2670]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2670 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.252000 audit[2670]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdc02f4d80 a2=0 a3=7ffdc02f4d6c items=0 ppid=2515 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.252000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:36:53.256000 audit[2673]: NETFILTER_CFG table=filter:79 family=10 entries=2 op=nft_register_chain pid=2673 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.256000 audit[2673]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd4255e180 a2=0 a3=7ffd4255e16c items=0 ppid=2515 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.256000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:36:53.257000 audit[2674]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_chain pid=2674 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.257000 audit[2674]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc75199a40 a2=0 a3=7ffc75199a2c items=0 ppid=2515 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.257000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:36:53.259000 audit[2676]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2676 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.259000 audit[2676]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd9f2b0a60 a2=0 a3=7ffd9f2b0a4c items=0 ppid=2515 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.259000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:36:53.261000 audit[2677]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2677 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.261000 audit[2677]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6402cd90 a2=0 a3=7ffd6402cd7c items=0 ppid=2515 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.261000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:36:53.263000 audit[2679]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2679 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.263000 audit[2679]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe282fe2c0 a2=0 a3=7ffe282fe2ac items=0 ppid=2515 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.263000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:36:53.266000 audit[2682]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2682 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.266000 audit[2682]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdab7e33f0 a2=0 a3=7ffdab7e33dc items=0 ppid=2515 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.266000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:36:53.271000 audit[2685]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2685 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.271000 audit[2685]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9b43e780 a2=0 a3=7fff9b43e76c items=0 ppid=2515 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.271000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:36:53.272000 audit[2686]: NETFILTER_CFG table=nat:86 family=10 entries=1 op=nft_register_chain pid=2686 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.272000 audit[2686]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd12cde440 a2=0 a3=7ffd12cde42c items=0 ppid=2515 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.272000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:36:53.275000 audit[2688]: NETFILTER_CFG table=nat:87 family=10 entries=2 op=nft_register_chain pid=2688 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.275000 audit[2688]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffecc6dccb0 a2=0 a3=7ffecc6dcc9c items=0 ppid=2515 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:36:53.279000 audit[2691]: NETFILTER_CFG table=nat:88 family=10 entries=2 op=nft_register_chain pid=2691 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.279000 audit[2691]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc00986520 a2=0 a3=7ffc0098650c items=0 ppid=2515 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.279000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:36:53.280000 audit[2692]: NETFILTER_CFG table=nat:89 family=10 entries=1 op=nft_register_chain pid=2692 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.280000 audit[2692]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb1c77860 a2=0 a3=7ffeb1c7784c items=0 ppid=2515 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:36:53.282000 audit[2694]: NETFILTER_CFG table=nat:90 family=10 entries=2 op=nft_register_chain pid=2694 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.282000 audit[2694]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcded6a1b0 a2=0 a3=7ffcded6a19c items=0 ppid=2515 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.282000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:36:53.283000 audit[2695]: NETFILTER_CFG table=filter:91 family=10 entries=1 op=nft_register_chain pid=2695 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.283000 audit[2695]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbbeafd10 a2=0 a3=7ffcbbeafcfc items=0 ppid=2515 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.283000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:36:53.285000 audit[2697]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_rule pid=2697 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.285000 audit[2697]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcc67b9250 a2=0 a3=7ffcc67b923c items=0 ppid=2515 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.285000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:36:53.289000 audit[2700]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=2700 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:36:53.289000 audit[2700]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffda7eb42a0 a2=0 a3=7ffda7eb428c items=0 ppid=2515 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:36:53.293000 audit[2702]: NETFILTER_CFG table=filter:94 family=10 entries=3 op=nft_register_rule pid=2702 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:36:53.293000 audit[2702]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffc75440b50 a2=0 a3=7ffc75440b3c items=0 ppid=2515 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.293000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:53.293000 audit[2702]: NETFILTER_CFG table=nat:95 family=10 entries=7 op=nft_register_chain pid=2702 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:36:53.293000 audit[2702]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc75440b50 a2=0 a3=7ffc75440b3c items=0 ppid=2515 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:53.293000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:54.365510 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2560501774.mount: Deactivated successfully. May 17 00:36:55.354615 env[1418]: time="2025-05-17T00:36:55.354569935Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:55.360840 env[1418]: time="2025-05-17T00:36:55.360806655Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:55.364535 env[1418]: time="2025-05-17T00:36:55.364505386Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:55.368041 env[1418]: time="2025-05-17T00:36:55.368008310Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:55.368554 env[1418]: time="2025-05-17T00:36:55.368525229Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\" returns image reference \"sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033\"" May 17 00:36:55.371415 env[1418]: time="2025-05-17T00:36:55.371210124Z" level=info msg="CreateContainer within sandbox \"e1deac7384aced602002dec0da807af80e363b45f9da4bbc63ddca9387e51f0e\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 17 00:36:55.399104 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1261484669.mount: Deactivated successfully. May 17 00:36:55.414556 env[1418]: time="2025-05-17T00:36:55.414511157Z" level=info msg="CreateContainer within sandbox \"e1deac7384aced602002dec0da807af80e363b45f9da4bbc63ddca9387e51f0e\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"6a09a3f9f9538e4865d044ffd90a942f3fbc6cd527d1f31985cbbdcffa771d64\"" May 17 00:36:55.415313 env[1418]: time="2025-05-17T00:36:55.415282985Z" level=info msg="StartContainer for \"6a09a3f9f9538e4865d044ffd90a942f3fbc6cd527d1f31985cbbdcffa771d64\"" May 17 00:36:55.441888 systemd[1]: Started cri-containerd-6a09a3f9f9538e4865d044ffd90a942f3fbc6cd527d1f31985cbbdcffa771d64.scope. May 17 00:36:55.461797 kernel: kauditd_printk_skb: 312 callbacks suppressed May 17 00:36:55.461921 kernel: audit: type=1400 audit(1747442215.453:922): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.482066 kernel: audit: type=1400 audit(1747442215.453:923): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.494555 kernel: audit: type=1400 audit(1747442215.453:924): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.512779 kernel: audit: type=1400 audit(1747442215.453:925): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.526330 kernel: audit: type=1400 audit(1747442215.453:926): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.537721 kernel: audit: type=1400 audit(1747442215.453:927): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.540081 env[1418]: time="2025-05-17T00:36:55.540011602Z" level=info msg="StartContainer for \"6a09a3f9f9538e4865d044ffd90a942f3fbc6cd527d1f31985cbbdcffa771d64\" returns successfully" May 17 00:36:55.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.555783 kernel: audit: type=1400 audit(1747442215.453:928): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.570999 kernel: audit: type=1400 audit(1747442215.453:929): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.583792 kernel: audit: type=1400 audit(1747442215.453:930): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.583842 kernel: audit: type=1400 audit(1747442215.458:931): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.458000 audit: BPF prog-id=115 op=LOAD May 17 00:36:55.463000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.463000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2528 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:55.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661303961336639663935333865343836356430343466666439306139 May 17 00:36:55.463000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.463000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2528 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:55.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661303961336639663935333865343836356430343466666439306139 May 17 00:36:55.463000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.463000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.463000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.463000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.463000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.463000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.463000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.463000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.463000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.463000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.463000 audit: BPF prog-id=116 op=LOAD May 17 00:36:55.463000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003b6010 items=0 ppid=2528 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:55.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661303961336639663935333865343836356430343466666439306139 May 17 00:36:55.469000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.469000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.469000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.469000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.469000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.469000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.469000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.469000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.469000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.469000 audit: BPF prog-id=117 op=LOAD May 17 00:36:55.469000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003b6058 items=0 ppid=2528 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:55.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661303961336639663935333865343836356430343466666439306139 May 17 00:36:55.481000 audit: BPF prog-id=117 op=UNLOAD May 17 00:36:55.481000 audit: BPF prog-id=116 op=UNLOAD May 17 00:36:55.481000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.481000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.481000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.481000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.481000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.481000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.481000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.481000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.481000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.481000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:55.481000 audit: BPF prog-id=118 op=LOAD May 17 00:36:55.481000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003b6468 items=0 ppid=2528 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:55.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661303961336639663935333865343836356430343466666439306139 May 17 00:36:56.146032 kubelet[2411]: I0517 00:36:56.143630 2411 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-8bhgx" podStartSLOduration=4.143610253 podStartE2EDuration="4.143610253s" podCreationTimestamp="2025-05-17 00:36:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:36:53.148656349 +0000 UTC m=+7.800602159" watchObservedRunningTime="2025-05-17 00:36:56.143610253 +0000 UTC m=+10.795555963" May 17 00:36:56.391687 systemd[1]: run-containerd-runc-k8s.io-6a09a3f9f9538e4865d044ffd90a942f3fbc6cd527d1f31985cbbdcffa771d64-runc.86osOu.mount: Deactivated successfully. May 17 00:36:57.150052 kubelet[2411]: I0517 00:36:57.149984 2411 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7c5755cdcb-gx8qq" podStartSLOduration=2.734341074 podStartE2EDuration="5.149959189s" podCreationTimestamp="2025-05-17 00:36:52 +0000 UTC" firstStartedPulling="2025-05-17 00:36:52.953908049 +0000 UTC m=+7.605853759" lastFinishedPulling="2025-05-17 00:36:55.369526164 +0000 UTC m=+10.021471874" observedRunningTime="2025-05-17 00:36:56.143951565 +0000 UTC m=+10.795897375" watchObservedRunningTime="2025-05-17 00:36:57.149959189 +0000 UTC m=+11.801904999" May 17 00:37:01.663431 sudo[1747]: pam_unix(sudo:session): session closed for user root May 17 00:37:01.686171 kernel: kauditd_printk_skb: 47 callbacks suppressed May 17 00:37:01.686323 kernel: audit: type=1106 audit(1747442221.662:940): pid=1747 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:37:01.662000 audit[1747]: USER_END pid=1747 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:37:01.662000 audit[1747]: CRED_DISP pid=1747 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:37:01.705866 kernel: audit: type=1104 audit(1747442221.662:941): pid=1747 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:37:01.766490 sshd[1744]: pam_unix(sshd:session): session closed for user core May 17 00:37:01.768000 audit[1744]: USER_END pid=1744 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:01.789917 kernel: audit: type=1106 audit(1747442221.768:942): pid=1744 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:01.790804 systemd-logind[1408]: Session 9 logged out. Waiting for processes to exit. May 17 00:37:01.791257 systemd[1]: sshd@6-10.200.4.20:22-10.200.16.10:47976.service: Deactivated successfully. May 17 00:37:01.792193 systemd[1]: session-9.scope: Deactivated successfully. May 17 00:37:01.792363 systemd[1]: session-9.scope: Consumed 4.463s CPU time. May 17 00:37:01.793573 systemd-logind[1408]: Removed session 9. May 17 00:37:01.768000 audit[1744]: CRED_DISP pid=1744 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:01.811780 kernel: audit: type=1104 audit(1747442221.768:943): pid=1744 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:01.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.20:22-10.200.16.10:47976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:01.832791 kernel: audit: type=1131 audit(1747442221.790:944): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.20:22-10.200.16.10:47976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:02.586000 audit[2789]: NETFILTER_CFG table=filter:96 family=2 entries=15 op=nft_register_rule pid=2789 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:02.598782 kernel: audit: type=1325 audit(1747442222.586:945): table=filter:96 family=2 entries=15 op=nft_register_rule pid=2789 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:02.598899 kernel: audit: type=1300 audit(1747442222.586:945): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe675846a0 a2=0 a3=7ffe6758468c items=0 ppid=2515 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:02.586000 audit[2789]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe675846a0 a2=0 a3=7ffe6758468c items=0 ppid=2515 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:02.586000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:02.628486 kernel: audit: type=1327 audit(1747442222.586:945): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:02.629000 audit[2789]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=2789 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:02.641780 kernel: audit: type=1325 audit(1747442222.629:946): table=nat:97 family=2 entries=12 op=nft_register_rule pid=2789 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:02.629000 audit[2789]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe675846a0 a2=0 a3=0 items=0 ppid=2515 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:02.662783 kernel: audit: type=1300 audit(1747442222.629:946): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe675846a0 a2=0 a3=0 items=0 ppid=2515 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:02.629000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:02.727000 audit[2791]: NETFILTER_CFG table=filter:98 family=2 entries=16 op=nft_register_rule pid=2791 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:02.727000 audit[2791]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffeba07000 a2=0 a3=7fffeba06fec items=0 ppid=2515 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:02.727000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:02.733000 audit[2791]: NETFILTER_CFG table=nat:99 family=2 entries=12 op=nft_register_rule pid=2791 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:02.733000 audit[2791]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffeba07000 a2=0 a3=0 items=0 ppid=2515 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:02.733000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:05.671000 audit[2793]: NETFILTER_CFG table=filter:100 family=2 entries=17 op=nft_register_rule pid=2793 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:05.671000 audit[2793]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd7a615f40 a2=0 a3=7ffd7a615f2c items=0 ppid=2515 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:05.671000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:05.677000 audit[2793]: NETFILTER_CFG table=nat:101 family=2 entries=12 op=nft_register_rule pid=2793 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:05.677000 audit[2793]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd7a615f40 a2=0 a3=0 items=0 ppid=2515 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:05.677000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:05.689000 audit[2795]: NETFILTER_CFG table=filter:102 family=2 entries=18 op=nft_register_rule pid=2795 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:05.689000 audit[2795]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffdcba082d0 a2=0 a3=7ffdcba082bc items=0 ppid=2515 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:05.689000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:05.694000 audit[2795]: NETFILTER_CFG table=nat:103 family=2 entries=12 op=nft_register_rule pid=2795 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:05.694000 audit[2795]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdcba082d0 a2=0 a3=0 items=0 ppid=2515 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:05.694000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:06.383318 systemd[1]: Created slice kubepods-besteffort-podcc7d5ccd_cfea_4f22_9b8b_60bff3567b80.slice. May 17 00:37:06.414612 kubelet[2411]: I0517 00:37:06.414557 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cc7d5ccd-cfea-4f22-9b8b-60bff3567b80-tigera-ca-bundle\") pod \"calico-typha-757fcdb595-bwh6p\" (UID: \"cc7d5ccd-cfea-4f22-9b8b-60bff3567b80\") " pod="calico-system/calico-typha-757fcdb595-bwh6p" May 17 00:37:06.415058 kubelet[2411]: I0517 00:37:06.414656 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/cc7d5ccd-cfea-4f22-9b8b-60bff3567b80-typha-certs\") pod \"calico-typha-757fcdb595-bwh6p\" (UID: \"cc7d5ccd-cfea-4f22-9b8b-60bff3567b80\") " pod="calico-system/calico-typha-757fcdb595-bwh6p" May 17 00:37:06.415058 kubelet[2411]: I0517 00:37:06.414698 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jn9f5\" (UniqueName: \"kubernetes.io/projected/cc7d5ccd-cfea-4f22-9b8b-60bff3567b80-kube-api-access-jn9f5\") pod \"calico-typha-757fcdb595-bwh6p\" (UID: \"cc7d5ccd-cfea-4f22-9b8b-60bff3567b80\") " pod="calico-system/calico-typha-757fcdb595-bwh6p" May 17 00:37:06.605737 systemd[1]: Created slice kubepods-besteffort-pod1a3794ba_01cb_47d3_982f_396f2fd80c60.slice. May 17 00:37:06.690155 env[1418]: time="2025-05-17T00:37:06.690035026Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-757fcdb595-bwh6p,Uid:cc7d5ccd-cfea-4f22-9b8b-60bff3567b80,Namespace:calico-system,Attempt:0,}" May 17 00:37:06.704000 audit[2802]: NETFILTER_CFG table=filter:104 family=2 entries=20 op=nft_register_rule pid=2802 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:06.709243 kernel: kauditd_printk_skb: 19 callbacks suppressed May 17 00:37:06.709323 kernel: audit: type=1325 audit(1747442226.704:953): table=filter:104 family=2 entries=20 op=nft_register_rule pid=2802 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:06.716772 kubelet[2411]: I0517 00:37:06.716728 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1a3794ba-01cb-47d3-982f-396f2fd80c60-node-certs\") pod \"calico-node-4clln\" (UID: \"1a3794ba-01cb-47d3-982f-396f2fd80c60\") " pod="calico-system/calico-node-4clln" May 17 00:37:06.716951 kubelet[2411]: I0517 00:37:06.716934 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1a3794ba-01cb-47d3-982f-396f2fd80c60-lib-modules\") pod \"calico-node-4clln\" (UID: \"1a3794ba-01cb-47d3-982f-396f2fd80c60\") " pod="calico-system/calico-node-4clln" May 17 00:37:06.717066 kubelet[2411]: I0517 00:37:06.717053 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1a3794ba-01cb-47d3-982f-396f2fd80c60-policysync\") pod \"calico-node-4clln\" (UID: \"1a3794ba-01cb-47d3-982f-396f2fd80c60\") " pod="calico-system/calico-node-4clln" May 17 00:37:06.717153 kubelet[2411]: I0517 00:37:06.717141 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1a3794ba-01cb-47d3-982f-396f2fd80c60-tigera-ca-bundle\") pod \"calico-node-4clln\" (UID: \"1a3794ba-01cb-47d3-982f-396f2fd80c60\") " pod="calico-system/calico-node-4clln" May 17 00:37:06.717243 kubelet[2411]: I0517 00:37:06.717230 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1a3794ba-01cb-47d3-982f-396f2fd80c60-cni-log-dir\") pod \"calico-node-4clln\" (UID: \"1a3794ba-01cb-47d3-982f-396f2fd80c60\") " pod="calico-system/calico-node-4clln" May 17 00:37:06.717326 kubelet[2411]: I0517 00:37:06.717312 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zk4pn\" (UniqueName: \"kubernetes.io/projected/1a3794ba-01cb-47d3-982f-396f2fd80c60-kube-api-access-zk4pn\") pod \"calico-node-4clln\" (UID: \"1a3794ba-01cb-47d3-982f-396f2fd80c60\") " pod="calico-system/calico-node-4clln" May 17 00:37:06.717405 kubelet[2411]: I0517 00:37:06.717393 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1a3794ba-01cb-47d3-982f-396f2fd80c60-cni-net-dir\") pod \"calico-node-4clln\" (UID: \"1a3794ba-01cb-47d3-982f-396f2fd80c60\") " pod="calico-system/calico-node-4clln" May 17 00:37:06.717486 kubelet[2411]: I0517 00:37:06.717474 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1a3794ba-01cb-47d3-982f-396f2fd80c60-var-lib-calico\") pod \"calico-node-4clln\" (UID: \"1a3794ba-01cb-47d3-982f-396f2fd80c60\") " pod="calico-system/calico-node-4clln" May 17 00:37:06.717566 kubelet[2411]: I0517 00:37:06.717555 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1a3794ba-01cb-47d3-982f-396f2fd80c60-cni-bin-dir\") pod \"calico-node-4clln\" (UID: \"1a3794ba-01cb-47d3-982f-396f2fd80c60\") " pod="calico-system/calico-node-4clln" May 17 00:37:06.717645 kubelet[2411]: I0517 00:37:06.717633 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1a3794ba-01cb-47d3-982f-396f2fd80c60-flexvol-driver-host\") pod \"calico-node-4clln\" (UID: \"1a3794ba-01cb-47d3-982f-396f2fd80c60\") " pod="calico-system/calico-node-4clln" May 17 00:37:06.717722 kubelet[2411]: I0517 00:37:06.717711 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1a3794ba-01cb-47d3-982f-396f2fd80c60-var-run-calico\") pod \"calico-node-4clln\" (UID: \"1a3794ba-01cb-47d3-982f-396f2fd80c60\") " pod="calico-system/calico-node-4clln" May 17 00:37:06.717821 kubelet[2411]: I0517 00:37:06.717808 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1a3794ba-01cb-47d3-982f-396f2fd80c60-xtables-lock\") pod \"calico-node-4clln\" (UID: \"1a3794ba-01cb-47d3-982f-396f2fd80c60\") " pod="calico-system/calico-node-4clln" May 17 00:37:06.704000 audit[2802]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffe76127c40 a2=0 a3=7ffe76127c2c items=0 ppid=2515 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:06.737311 kernel: audit: type=1300 audit(1747442226.704:953): arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffe76127c40 a2=0 a3=7ffe76127c2c items=0 ppid=2515 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:06.704000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:06.746288 kernel: audit: type=1327 audit(1747442226.704:953): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:06.719000 audit[2802]: NETFILTER_CFG table=nat:105 family=2 entries=12 op=nft_register_rule pid=2802 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:06.755623 kernel: audit: type=1325 audit(1747442226.719:954): table=nat:105 family=2 entries=12 op=nft_register_rule pid=2802 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:06.719000 audit[2802]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe76127c40 a2=0 a3=0 items=0 ppid=2515 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:06.719000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:06.783717 kernel: audit: type=1300 audit(1747442226.719:954): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe76127c40 a2=0 a3=0 items=0 ppid=2515 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:06.783809 kernel: audit: type=1327 audit(1747442226.719:954): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:06.802570 env[1418]: time="2025-05-17T00:37:06.802353979Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:06.802570 env[1418]: time="2025-05-17T00:37:06.802409781Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:06.802570 env[1418]: time="2025-05-17T00:37:06.802422681Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:06.802991 env[1418]: time="2025-05-17T00:37:06.802907694Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/38e60dffe6975b4e4d5655b7527a6a8f422f7a9750153b6b08b5a31707e1d291 pid=2810 runtime=io.containerd.runc.v2 May 17 00:37:06.821881 kubelet[2411]: E0517 00:37:06.821827 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.821881 kubelet[2411]: W0517 00:37:06.821870 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.822089 kubelet[2411]: E0517 00:37:06.821901 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.827196 kubelet[2411]: E0517 00:37:06.827100 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.827196 kubelet[2411]: W0517 00:37:06.827120 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.827196 kubelet[2411]: E0517 00:37:06.827146 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.838513 kubelet[2411]: E0517 00:37:06.838485 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.838513 kubelet[2411]: W0517 00:37:06.838507 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.838783 kubelet[2411]: E0517 00:37:06.838622 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.838848 kubelet[2411]: E0517 00:37:06.838814 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.838848 kubelet[2411]: W0517 00:37:06.838827 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.838954 kubelet[2411]: E0517 00:37:06.838915 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.839060 kubelet[2411]: E0517 00:37:06.839048 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.839060 kubelet[2411]: W0517 00:37:06.839057 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.841909 kubelet[2411]: E0517 00:37:06.839190 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.841909 kubelet[2411]: E0517 00:37:06.839334 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.841909 kubelet[2411]: W0517 00:37:06.839344 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.841909 kubelet[2411]: E0517 00:37:06.839361 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.841909 kubelet[2411]: E0517 00:37:06.839551 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.841909 kubelet[2411]: W0517 00:37:06.839563 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.841909 kubelet[2411]: E0517 00:37:06.839577 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.841909 kubelet[2411]: E0517 00:37:06.839750 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.841909 kubelet[2411]: W0517 00:37:06.839772 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.841909 kubelet[2411]: E0517 00:37:06.839787 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.842323 kubelet[2411]: E0517 00:37:06.839992 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.842323 kubelet[2411]: W0517 00:37:06.840004 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.842323 kubelet[2411]: E0517 00:37:06.840017 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.845331 systemd[1]: Started cri-containerd-38e60dffe6975b4e4d5655b7527a6a8f422f7a9750153b6b08b5a31707e1d291.scope. May 17 00:37:06.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881780 kernel: audit: type=1400 audit(1747442226.867:955): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.897032 kernel: audit: type=1400 audit(1747442226.867:956): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.912616 kubelet[2411]: E0517 00:37:06.899837 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.912616 kubelet[2411]: W0517 00:37:06.899859 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.912616 kubelet[2411]: E0517 00:37:06.899882 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.912920 kernel: audit: type=1400 audit(1747442226.867:957): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.914570 env[1418]: time="2025-05-17T00:37:06.914528128Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4clln,Uid:1a3794ba-01cb-47d3-982f-396f2fd80c60,Namespace:calico-system,Attempt:0,}" May 17 00:37:06.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.927911 kernel: audit: type=1400 audit(1747442226.867:958): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.928696 kubelet[2411]: E0517 00:37:06.928532 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ggd4c" podUID="229d7143-68c7-4436-b5a7-e1de78e6c47a" May 17 00:37:06.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.867000 audit: BPF prog-id=119 op=LOAD May 17 00:37:06.881000 audit[2821]: AVC avc: denied { bpf } for pid=2821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881000 audit[2821]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2810 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:06.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338653630646666653639373562346534643536353562373532376136 May 17 00:37:06.881000 audit[2821]: AVC avc: denied { perfmon } for pid=2821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881000 audit[2821]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2810 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:06.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338653630646666653639373562346534643536353562373532376136 May 17 00:37:06.881000 audit[2821]: AVC avc: denied { bpf } for pid=2821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881000 audit[2821]: AVC avc: denied { bpf } for pid=2821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881000 audit[2821]: AVC avc: denied { bpf } for pid=2821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881000 audit[2821]: AVC avc: denied { perfmon } for pid=2821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881000 audit[2821]: AVC avc: denied { perfmon } for pid=2821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881000 audit[2821]: AVC avc: denied { perfmon } for pid=2821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881000 audit[2821]: AVC avc: denied { perfmon } for pid=2821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881000 audit[2821]: AVC avc: denied { perfmon } for pid=2821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881000 audit[2821]: AVC avc: denied { bpf } for pid=2821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881000 audit[2821]: AVC avc: denied { bpf } for pid=2821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881000 audit: BPF prog-id=120 op=LOAD May 17 00:37:06.881000 audit[2821]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001c86f0 items=0 ppid=2810 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:06.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338653630646666653639373562346534643536353562373532376136 May 17 00:37:06.881000 audit[2821]: AVC avc: denied { bpf } for pid=2821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881000 audit[2821]: AVC avc: denied { bpf } for pid=2821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881000 audit[2821]: AVC avc: denied { perfmon } for pid=2821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881000 audit[2821]: AVC avc: denied { perfmon } for pid=2821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881000 audit[2821]: AVC avc: denied { perfmon } for pid=2821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881000 audit[2821]: AVC avc: denied { perfmon } for pid=2821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881000 audit[2821]: AVC avc: denied { perfmon } for pid=2821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881000 audit[2821]: AVC avc: denied { bpf } for pid=2821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881000 audit[2821]: AVC avc: denied { bpf } for pid=2821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.881000 audit: BPF prog-id=121 op=LOAD May 17 00:37:06.881000 audit[2821]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001c8738 items=0 ppid=2810 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:06.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338653630646666653639373562346534643536353562373532376136 May 17 00:37:06.881000 audit: BPF prog-id=121 op=UNLOAD May 17 00:37:06.882000 audit: BPF prog-id=120 op=UNLOAD May 17 00:37:06.882000 audit[2821]: AVC avc: denied { bpf } for pid=2821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.882000 audit[2821]: AVC avc: denied { bpf } for pid=2821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.882000 audit[2821]: AVC avc: denied { bpf } for pid=2821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.882000 audit[2821]: AVC avc: denied { perfmon } for pid=2821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.882000 audit[2821]: AVC avc: denied { perfmon } for pid=2821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.882000 audit[2821]: AVC avc: denied { perfmon } for pid=2821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.882000 audit[2821]: AVC avc: denied { perfmon } for pid=2821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.882000 audit[2821]: AVC avc: denied { perfmon } for pid=2821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.882000 audit[2821]: AVC avc: denied { bpf } for pid=2821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.882000 audit[2821]: AVC avc: denied { bpf } for pid=2821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:06.882000 audit: BPF prog-id=122 op=LOAD May 17 00:37:06.882000 audit[2821]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001c8b48 items=0 ppid=2810 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:06.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338653630646666653639373562346534643536353562373532376136 May 17 00:37:06.989433 env[1418]: time="2025-05-17T00:37:06.985935269Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:06.989433 env[1418]: time="2025-05-17T00:37:06.986011771Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:06.989433 env[1418]: time="2025-05-17T00:37:06.986039572Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:06.989433 env[1418]: time="2025-05-17T00:37:06.986188676Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3cedccdbd046e51ce0f14b0ade3aa39078261660d45bd6703c4c82e117077ea3 pid=2859 runtime=io.containerd.runc.v2 May 17 00:37:06.990213 kubelet[2411]: E0517 00:37:06.990181 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.990213 kubelet[2411]: W0517 00:37:06.990207 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.990371 kubelet[2411]: E0517 00:37:06.990235 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.990543 kubelet[2411]: E0517 00:37:06.990519 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.990630 kubelet[2411]: W0517 00:37:06.990545 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.990630 kubelet[2411]: E0517 00:37:06.990561 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.990802 kubelet[2411]: E0517 00:37:06.990785 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.990873 kubelet[2411]: W0517 00:37:06.990803 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.990873 kubelet[2411]: E0517 00:37:06.990823 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.991091 kubelet[2411]: E0517 00:37:06.991075 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.991184 kubelet[2411]: W0517 00:37:06.991091 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.991184 kubelet[2411]: E0517 00:37:06.991105 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.991350 kubelet[2411]: E0517 00:37:06.991334 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.991428 kubelet[2411]: W0517 00:37:06.991350 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.991428 kubelet[2411]: E0517 00:37:06.991372 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.991583 kubelet[2411]: E0517 00:37:06.991568 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.991660 kubelet[2411]: W0517 00:37:06.991583 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.991660 kubelet[2411]: E0517 00:37:06.991596 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.991825 kubelet[2411]: E0517 00:37:06.991810 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.991893 kubelet[2411]: W0517 00:37:06.991825 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.991893 kubelet[2411]: E0517 00:37:06.991845 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.992068 kubelet[2411]: E0517 00:37:06.992052 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.992068 kubelet[2411]: W0517 00:37:06.992067 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.992187 kubelet[2411]: E0517 00:37:06.992080 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.992312 kubelet[2411]: E0517 00:37:06.992296 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.992312 kubelet[2411]: W0517 00:37:06.992311 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.992442 kubelet[2411]: E0517 00:37:06.992324 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.992543 kubelet[2411]: E0517 00:37:06.992527 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.992622 kubelet[2411]: W0517 00:37:06.992543 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.992622 kubelet[2411]: E0517 00:37:06.992555 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.995949 kubelet[2411]: E0517 00:37:06.995927 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.996033 kubelet[2411]: W0517 00:37:06.995951 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.996033 kubelet[2411]: E0517 00:37:06.995966 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.996188 kubelet[2411]: E0517 00:37:06.996171 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.996264 kubelet[2411]: W0517 00:37:06.996189 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.996264 kubelet[2411]: E0517 00:37:06.996209 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.996427 kubelet[2411]: E0517 00:37:06.996412 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.996484 kubelet[2411]: W0517 00:37:06.996427 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.996484 kubelet[2411]: E0517 00:37:06.996440 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.996647 kubelet[2411]: E0517 00:37:06.996632 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.996714 kubelet[2411]: W0517 00:37:06.996647 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.996714 kubelet[2411]: E0517 00:37:06.996659 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.996914 kubelet[2411]: E0517 00:37:06.996892 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.996981 kubelet[2411]: W0517 00:37:06.996914 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.996981 kubelet[2411]: E0517 00:37:06.996927 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.997135 kubelet[2411]: E0517 00:37:06.997121 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.997199 kubelet[2411]: W0517 00:37:06.997135 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.997199 kubelet[2411]: E0517 00:37:06.997148 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.997372 kubelet[2411]: E0517 00:37:06.997357 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.997429 kubelet[2411]: W0517 00:37:06.997372 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.997429 kubelet[2411]: E0517 00:37:06.997387 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.997594 kubelet[2411]: E0517 00:37:06.997580 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.997661 kubelet[2411]: W0517 00:37:06.997595 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.997661 kubelet[2411]: E0517 00:37:06.997607 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.997816 kubelet[2411]: E0517 00:37:06.997802 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.997869 kubelet[2411]: W0517 00:37:06.997817 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.997869 kubelet[2411]: E0517 00:37:06.997829 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:06.998042 kubelet[2411]: E0517 00:37:06.998027 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:06.998042 kubelet[2411]: W0517 00:37:06.998042 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:06.998140 kubelet[2411]: E0517 00:37:06.998054 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.020725 kubelet[2411]: E0517 00:37:07.020020 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.020725 kubelet[2411]: W0517 00:37:07.020045 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.020725 kubelet[2411]: E0517 00:37:07.020072 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.020725 kubelet[2411]: I0517 00:37:07.020112 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/229d7143-68c7-4436-b5a7-e1de78e6c47a-kubelet-dir\") pod \"csi-node-driver-ggd4c\" (UID: \"229d7143-68c7-4436-b5a7-e1de78e6c47a\") " pod="calico-system/csi-node-driver-ggd4c" May 17 00:37:07.020725 kubelet[2411]: E0517 00:37:07.020370 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.020725 kubelet[2411]: W0517 00:37:07.020384 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.020725 kubelet[2411]: E0517 00:37:07.020404 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.020725 kubelet[2411]: I0517 00:37:07.020427 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/229d7143-68c7-4436-b5a7-e1de78e6c47a-socket-dir\") pod \"csi-node-driver-ggd4c\" (UID: \"229d7143-68c7-4436-b5a7-e1de78e6c47a\") " pod="calico-system/csi-node-driver-ggd4c" May 17 00:37:07.020725 kubelet[2411]: E0517 00:37:07.020644 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.021286 kubelet[2411]: W0517 00:37:07.020655 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.021286 kubelet[2411]: E0517 00:37:07.020671 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.021286 kubelet[2411]: I0517 00:37:07.020690 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/229d7143-68c7-4436-b5a7-e1de78e6c47a-registration-dir\") pod \"csi-node-driver-ggd4c\" (UID: \"229d7143-68c7-4436-b5a7-e1de78e6c47a\") " pod="calico-system/csi-node-driver-ggd4c" May 17 00:37:07.021286 kubelet[2411]: E0517 00:37:07.020946 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.021286 kubelet[2411]: W0517 00:37:07.020959 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.021286 kubelet[2411]: E0517 00:37:07.020980 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.021286 kubelet[2411]: I0517 00:37:07.021001 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/229d7143-68c7-4436-b5a7-e1de78e6c47a-varrun\") pod \"csi-node-driver-ggd4c\" (UID: \"229d7143-68c7-4436-b5a7-e1de78e6c47a\") " pod="calico-system/csi-node-driver-ggd4c" May 17 00:37:07.021286 kubelet[2411]: E0517 00:37:07.021238 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.021696 kubelet[2411]: W0517 00:37:07.021251 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.021696 kubelet[2411]: E0517 00:37:07.021268 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.021696 kubelet[2411]: I0517 00:37:07.021291 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f4wjd\" (UniqueName: \"kubernetes.io/projected/229d7143-68c7-4436-b5a7-e1de78e6c47a-kube-api-access-f4wjd\") pod \"csi-node-driver-ggd4c\" (UID: \"229d7143-68c7-4436-b5a7-e1de78e6c47a\") " pod="calico-system/csi-node-driver-ggd4c" May 17 00:37:07.021696 kubelet[2411]: E0517 00:37:07.021520 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.021696 kubelet[2411]: W0517 00:37:07.021552 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.021696 kubelet[2411]: E0517 00:37:07.021658 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.022017 kubelet[2411]: E0517 00:37:07.021801 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.022017 kubelet[2411]: W0517 00:37:07.021813 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.022017 kubelet[2411]: E0517 00:37:07.021925 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.022146 kubelet[2411]: E0517 00:37:07.022050 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.022146 kubelet[2411]: W0517 00:37:07.022060 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.022252 kubelet[2411]: E0517 00:37:07.022153 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.022304 kubelet[2411]: E0517 00:37:07.022267 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.022304 kubelet[2411]: W0517 00:37:07.022277 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.022406 kubelet[2411]: E0517 00:37:07.022373 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.025333 kubelet[2411]: E0517 00:37:07.022487 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.025333 kubelet[2411]: W0517 00:37:07.022499 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.025333 kubelet[2411]: E0517 00:37:07.022586 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.025333 kubelet[2411]: E0517 00:37:07.022703 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.025333 kubelet[2411]: W0517 00:37:07.022713 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.025333 kubelet[2411]: E0517 00:37:07.022725 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.025333 kubelet[2411]: E0517 00:37:07.022951 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.025333 kubelet[2411]: W0517 00:37:07.022961 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.025333 kubelet[2411]: E0517 00:37:07.022974 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.025333 kubelet[2411]: E0517 00:37:07.023157 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.024286 systemd[1]: Started cri-containerd-3cedccdbd046e51ce0f14b0ade3aa39078261660d45bd6703c4c82e117077ea3.scope. May 17 00:37:07.025905 kubelet[2411]: W0517 00:37:07.023167 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.025905 kubelet[2411]: E0517 00:37:07.023179 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.025905 kubelet[2411]: E0517 00:37:07.023378 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.025905 kubelet[2411]: W0517 00:37:07.023387 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.025905 kubelet[2411]: E0517 00:37:07.023399 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.025905 kubelet[2411]: E0517 00:37:07.023595 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.025905 kubelet[2411]: W0517 00:37:07.023606 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.025905 kubelet[2411]: E0517 00:37:07.023619 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.060000 audit: BPF prog-id=123 op=LOAD May 17 00:37:07.061000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.061000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2859 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:07.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363656463636462643034366535316365306631346230616465336161 May 17 00:37:07.062000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.062000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2859 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:07.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363656463636462643034366535316365306631346230616465336161 May 17 00:37:07.062000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.062000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.062000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.062000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.062000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.062000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.062000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.062000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.062000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.062000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.062000 audit: BPF prog-id=124 op=LOAD May 17 00:37:07.062000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003289e0 items=0 ppid=2859 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:07.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363656463636462643034366535316365306631346230616465336161 May 17 00:37:07.063000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.063000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.063000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.063000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.063000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.063000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.063000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.063000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.063000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.063000 audit: BPF prog-id=125 op=LOAD May 17 00:37:07.063000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000328a28 items=0 ppid=2859 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:07.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363656463636462643034366535316365306631346230616465336161 May 17 00:37:07.064000 audit: BPF prog-id=125 op=UNLOAD May 17 00:37:07.064000 audit: BPF prog-id=124 op=UNLOAD May 17 00:37:07.064000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.064000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.064000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.064000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.064000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.064000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.064000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.064000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.064000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.064000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.064000 audit: BPF prog-id=126 op=LOAD May 17 00:37:07.064000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000328e38 items=0 ppid=2859 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:07.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363656463636462643034366535316365306631346230616465336161 May 17 00:37:07.081991 env[1418]: time="2025-05-17T00:37:07.081915828Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4clln,Uid:1a3794ba-01cb-47d3-982f-396f2fd80c60,Namespace:calico-system,Attempt:0,} returns sandbox id \"3cedccdbd046e51ce0f14b0ade3aa39078261660d45bd6703c4c82e117077ea3\"" May 17 00:37:07.083855 env[1418]: time="2025-05-17T00:37:07.083825279Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:37:07.122778 kubelet[2411]: E0517 00:37:07.122423 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.122778 kubelet[2411]: W0517 00:37:07.122450 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.122778 kubelet[2411]: E0517 00:37:07.122478 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.123112 kubelet[2411]: E0517 00:37:07.122819 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.123112 kubelet[2411]: W0517 00:37:07.122834 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.123112 kubelet[2411]: E0517 00:37:07.122853 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.123112 kubelet[2411]: E0517 00:37:07.123098 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.123112 kubelet[2411]: W0517 00:37:07.123110 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.123335 kubelet[2411]: E0517 00:37:07.123131 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.123383 kubelet[2411]: E0517 00:37:07.123346 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.123383 kubelet[2411]: W0517 00:37:07.123357 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.123383 kubelet[2411]: E0517 00:37:07.123370 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.123601 kubelet[2411]: E0517 00:37:07.123583 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.123601 kubelet[2411]: W0517 00:37:07.123600 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.123714 kubelet[2411]: E0517 00:37:07.123624 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.123900 kubelet[2411]: E0517 00:37:07.123887 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.123986 kubelet[2411]: W0517 00:37:07.123901 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.123986 kubelet[2411]: E0517 00:37:07.123926 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.124150 kubelet[2411]: E0517 00:37:07.124137 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.124212 kubelet[2411]: W0517 00:37:07.124152 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.124212 kubelet[2411]: E0517 00:37:07.124176 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.124385 kubelet[2411]: E0517 00:37:07.124373 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.124446 kubelet[2411]: W0517 00:37:07.124386 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.124446 kubelet[2411]: E0517 00:37:07.124402 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.124795 kubelet[2411]: E0517 00:37:07.124778 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.124795 kubelet[2411]: W0517 00:37:07.124793 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.125037 kubelet[2411]: E0517 00:37:07.124969 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.125037 kubelet[2411]: E0517 00:37:07.124986 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.125037 kubelet[2411]: W0517 00:37:07.124997 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.125037 kubelet[2411]: E0517 00:37:07.125013 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.125251 kubelet[2411]: E0517 00:37:07.125196 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.125251 kubelet[2411]: W0517 00:37:07.125207 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.125399 kubelet[2411]: E0517 00:37:07.125371 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.125399 kubelet[2411]: E0517 00:37:07.125397 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.125524 kubelet[2411]: W0517 00:37:07.125407 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.125622 kubelet[2411]: E0517 00:37:07.125589 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.125622 kubelet[2411]: E0517 00:37:07.125605 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.125622 kubelet[2411]: W0517 00:37:07.125614 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.125829 kubelet[2411]: E0517 00:37:07.125801 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.125829 kubelet[2411]: E0517 00:37:07.125817 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.125829 kubelet[2411]: W0517 00:37:07.125827 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.125993 kubelet[2411]: E0517 00:37:07.125844 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.126048 kubelet[2411]: E0517 00:37:07.126025 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.126048 kubelet[2411]: W0517 00:37:07.126035 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.126125 kubelet[2411]: E0517 00:37:07.126047 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.126384 kubelet[2411]: E0517 00:37:07.126283 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.126384 kubelet[2411]: W0517 00:37:07.126297 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.126384 kubelet[2411]: E0517 00:37:07.126311 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.126559 kubelet[2411]: E0517 00:37:07.126489 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.126559 kubelet[2411]: W0517 00:37:07.126499 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.126559 kubelet[2411]: E0517 00:37:07.126515 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.126753 kubelet[2411]: E0517 00:37:07.126699 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.126753 kubelet[2411]: W0517 00:37:07.126713 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.126753 kubelet[2411]: E0517 00:37:07.126726 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.130831 kubelet[2411]: E0517 00:37:07.127046 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.130831 kubelet[2411]: W0517 00:37:07.127061 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.130831 kubelet[2411]: E0517 00:37:07.127243 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.130831 kubelet[2411]: W0517 00:37:07.127254 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.130831 kubelet[2411]: E0517 00:37:07.127435 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.130831 kubelet[2411]: W0517 00:37:07.127445 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.130831 kubelet[2411]: E0517 00:37:07.127458 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.130831 kubelet[2411]: E0517 00:37:07.127628 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.130831 kubelet[2411]: W0517 00:37:07.127638 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.130831 kubelet[2411]: E0517 00:37:07.127651 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.130831 kubelet[2411]: E0517 00:37:07.127906 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.131305 kubelet[2411]: W0517 00:37:07.127916 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.131305 kubelet[2411]: E0517 00:37:07.127929 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.131305 kubelet[2411]: E0517 00:37:07.127952 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.131305 kubelet[2411]: E0517 00:37:07.127964 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.131305 kubelet[2411]: E0517 00:37:07.128131 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.131305 kubelet[2411]: W0517 00:37:07.128140 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.131305 kubelet[2411]: E0517 00:37:07.128152 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.131305 kubelet[2411]: E0517 00:37:07.128341 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.131305 kubelet[2411]: W0517 00:37:07.128350 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.131305 kubelet[2411]: E0517 00:37:07.128361 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.155541 kubelet[2411]: E0517 00:37:07.155460 2411 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:07.155541 kubelet[2411]: W0517 00:37:07.155482 2411 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:07.155541 kubelet[2411]: E0517 00:37:07.155504 2411 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:07.157652 env[1418]: time="2025-05-17T00:37:07.157608939Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-757fcdb595-bwh6p,Uid:cc7d5ccd-cfea-4f22-9b8b-60bff3567b80,Namespace:calico-system,Attempt:0,} returns sandbox id \"38e60dffe6975b4e4d5655b7527a6a8f422f7a9750153b6b08b5a31707e1d291\"" May 17 00:37:08.253131 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3805756670.mount: Deactivated successfully. May 17 00:37:08.443649 env[1418]: time="2025-05-17T00:37:08.443599838Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:08.449404 env[1418]: time="2025-05-17T00:37:08.449368888Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:08.454311 env[1418]: time="2025-05-17T00:37:08.454276415Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:08.457079 env[1418]: time="2025-05-17T00:37:08.457048587Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:08.457465 env[1418]: time="2025-05-17T00:37:08.457434097Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:37:08.459335 env[1418]: time="2025-05-17T00:37:08.459309146Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\"" May 17 00:37:08.460555 env[1418]: time="2025-05-17T00:37:08.460529778Z" level=info msg="CreateContainer within sandbox \"3cedccdbd046e51ce0f14b0ade3aa39078261660d45bd6703c4c82e117077ea3\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:37:08.500824 env[1418]: time="2025-05-17T00:37:08.499727096Z" level=info msg="CreateContainer within sandbox \"3cedccdbd046e51ce0f14b0ade3aa39078261660d45bd6703c4c82e117077ea3\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"4adc218745784414b8702a3721a4cf383051e7e756e7af85a45b7fff08962156\"" May 17 00:37:08.502688 env[1418]: time="2025-05-17T00:37:08.502610970Z" level=info msg="StartContainer for \"4adc218745784414b8702a3721a4cf383051e7e756e7af85a45b7fff08962156\"" May 17 00:37:08.530827 systemd[1]: Started cri-containerd-4adc218745784414b8702a3721a4cf383051e7e756e7af85a45b7fff08962156.scope. May 17 00:37:08.545000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.545000 audit[2968]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f27ec80ee38 items=0 ppid=2859 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461646332313837343537383434313462383730326133373231613463 May 17 00:37:08.545000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.545000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.545000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.545000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.545000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.545000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.545000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.545000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.545000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.545000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.545000 audit: BPF prog-id=127 op=LOAD May 17 00:37:08.545000 audit[2968]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002e2598 items=0 ppid=2859 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461646332313837343537383434313462383730326133373231613463 May 17 00:37:08.546000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.546000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.546000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.546000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.546000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.546000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.546000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.546000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.546000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.546000 audit: BPF prog-id=128 op=LOAD May 17 00:37:08.546000 audit[2968]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002e25e8 items=0 ppid=2859 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461646332313837343537383434313462383730326133373231613463 May 17 00:37:08.546000 audit: BPF prog-id=128 op=UNLOAD May 17 00:37:08.546000 audit: BPF prog-id=127 op=UNLOAD May 17 00:37:08.546000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.546000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.546000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.546000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.546000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.546000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.546000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.546000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.546000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.546000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.546000 audit: BPF prog-id=129 op=LOAD May 17 00:37:08.546000 audit[2968]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002e2678 items=0 ppid=2859 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461646332313837343537383434313462383730326133373231613463 May 17 00:37:08.566225 env[1418]: time="2025-05-17T00:37:08.566147220Z" level=info msg="StartContainer for \"4adc218745784414b8702a3721a4cf383051e7e756e7af85a45b7fff08962156\" returns successfully" May 17 00:37:08.575382 systemd[1]: cri-containerd-4adc218745784414b8702a3721a4cf383051e7e756e7af85a45b7fff08962156.scope: Deactivated successfully. May 17 00:37:08.576000 audit: BPF prog-id=129 op=UNLOAD May 17 00:37:08.602007 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4adc218745784414b8702a3721a4cf383051e7e756e7af85a45b7fff08962156-rootfs.mount: Deactivated successfully. May 17 00:37:09.084260 kubelet[2411]: E0517 00:37:09.084197 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ggd4c" podUID="229d7143-68c7-4436-b5a7-e1de78e6c47a" May 17 00:37:09.483770 env[1418]: time="2025-05-17T00:37:09.483635168Z" level=info msg="shim disconnected" id=4adc218745784414b8702a3721a4cf383051e7e756e7af85a45b7fff08962156 May 17 00:37:09.484327 env[1418]: time="2025-05-17T00:37:09.484299385Z" level=warning msg="cleaning up after shim disconnected" id=4adc218745784414b8702a3721a4cf383051e7e756e7af85a45b7fff08962156 namespace=k8s.io May 17 00:37:09.484416 env[1418]: time="2025-05-17T00:37:09.484397387Z" level=info msg="cleaning up dead shim" May 17 00:37:09.493667 env[1418]: time="2025-05-17T00:37:09.493630222Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:37:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3011 runtime=io.containerd.runc.v2\n" May 17 00:37:11.083673 kubelet[2411]: E0517 00:37:11.083599 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ggd4c" podUID="229d7143-68c7-4436-b5a7-e1de78e6c47a" May 17 00:37:11.933523 env[1418]: time="2025-05-17T00:37:11.933461685Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:11.942936 env[1418]: time="2025-05-17T00:37:11.942835513Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:11.948515 env[1418]: time="2025-05-17T00:37:11.948462349Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:11.955005 env[1418]: time="2025-05-17T00:37:11.954963507Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:11.955406 env[1418]: time="2025-05-17T00:37:11.955373417Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\" returns image reference \"sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be\"" May 17 00:37:11.959362 env[1418]: time="2025-05-17T00:37:11.959328413Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:37:11.975075 env[1418]: time="2025-05-17T00:37:11.975037295Z" level=info msg="CreateContainer within sandbox \"38e60dffe6975b4e4d5655b7527a6a8f422f7a9750153b6b08b5a31707e1d291\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 17 00:37:12.029071 env[1418]: time="2025-05-17T00:37:12.029015591Z" level=info msg="CreateContainer within sandbox \"38e60dffe6975b4e4d5655b7527a6a8f422f7a9750153b6b08b5a31707e1d291\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"6aa0549c8ba0f4a6dea7cc504c84e724ba4156a8f2732369cb2ab022ac399fe6\"" May 17 00:37:12.031015 env[1418]: time="2025-05-17T00:37:12.029807710Z" level=info msg="StartContainer for \"6aa0549c8ba0f4a6dea7cc504c84e724ba4156a8f2732369cb2ab022ac399fe6\"" May 17 00:37:12.058391 systemd[1]: Started cri-containerd-6aa0549c8ba0f4a6dea7cc504c84e724ba4156a8f2732369cb2ab022ac399fe6.scope. May 17 00:37:12.088079 kernel: kauditd_printk_skb: 154 callbacks suppressed May 17 00:37:12.088289 kernel: audit: type=1400 audit(1747442232.071:998): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.106802 kernel: audit: type=1400 audit(1747442232.071:999): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.132692 kernel: audit: type=1400 audit(1747442232.071:1000): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.132876 kernel: audit: type=1400 audit(1747442232.071:1001): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.152233 env[1418]: time="2025-05-17T00:37:12.152186418Z" level=info msg="StartContainer for \"6aa0549c8ba0f4a6dea7cc504c84e724ba4156a8f2732369cb2ab022ac399fe6\" returns successfully" May 17 00:37:12.160863 kernel: audit: type=1400 audit(1747442232.071:1002): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.161010 kernel: audit: type=1400 audit(1747442232.071:1003): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.173704 kernel: audit: type=1400 audit(1747442232.071:1004): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.173922 kernel: audit: type=1400 audit(1747442232.071:1005): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.199854 kernel: audit: type=1400 audit(1747442232.071:1006): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.213794 kernel: audit: type=1400 audit(1747442232.075:1007): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.075000 audit: BPF prog-id=130 op=LOAD May 17 00:37:12.075000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.075000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2810 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:12.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661613035343963386261306634613664656137636335303463383465 May 17 00:37:12.075000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.075000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=2810 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:12.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661613035343963386261306634613664656137636335303463383465 May 17 00:37:12.075000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.075000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.075000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.075000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.075000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.075000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.075000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.075000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.075000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.075000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.075000 audit: BPF prog-id=131 op=LOAD May 17 00:37:12.075000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0002fe4c0 items=0 ppid=2810 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:12.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661613035343963386261306634613664656137636335303463383465 May 17 00:37:12.087000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.087000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.087000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.087000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.087000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.087000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.087000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.087000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.087000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.087000 audit: BPF prog-id=132 op=LOAD May 17 00:37:12.087000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0002fe508 items=0 ppid=2810 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:12.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661613035343963386261306634613664656137636335303463383465 May 17 00:37:12.087000 audit: BPF prog-id=132 op=UNLOAD May 17 00:37:12.087000 audit: BPF prog-id=131 op=UNLOAD May 17 00:37:12.087000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.087000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.087000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.087000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.087000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.087000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.087000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.087000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.087000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.087000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:12.087000 audit: BPF prog-id=133 op=LOAD May 17 00:37:12.087000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0002fe918 items=0 ppid=2810 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:12.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661613035343963386261306634613664656137636335303463383465 May 17 00:37:13.083885 kubelet[2411]: E0517 00:37:13.083814 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ggd4c" podUID="229d7143-68c7-4436-b5a7-e1de78e6c47a" May 17 00:37:13.165665 kubelet[2411]: I0517 00:37:13.165631 2411 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:37:15.084264 kubelet[2411]: E0517 00:37:15.084214 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ggd4c" podUID="229d7143-68c7-4436-b5a7-e1de78e6c47a" May 17 00:37:16.046546 env[1418]: time="2025-05-17T00:37:16.046499985Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:16.062623 env[1418]: time="2025-05-17T00:37:16.062584736Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:16.070275 env[1418]: time="2025-05-17T00:37:16.070240703Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:16.075232 env[1418]: time="2025-05-17T00:37:16.075202111Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:16.075686 env[1418]: time="2025-05-17T00:37:16.075652921Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:37:16.078034 env[1418]: time="2025-05-17T00:37:16.078000172Z" level=info msg="CreateContainer within sandbox \"3cedccdbd046e51ce0f14b0ade3aa39078261660d45bd6703c4c82e117077ea3\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:37:16.131208 env[1418]: time="2025-05-17T00:37:16.131146932Z" level=info msg="CreateContainer within sandbox \"3cedccdbd046e51ce0f14b0ade3aa39078261660d45bd6703c4c82e117077ea3\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"ebd26366c5b6ecec289186c5b1940977285d669f73b054c10a9972b5f10a93b8\"" May 17 00:37:16.133516 env[1418]: time="2025-05-17T00:37:16.131810047Z" level=info msg="StartContainer for \"ebd26366c5b6ecec289186c5b1940977285d669f73b054c10a9972b5f10a93b8\"" May 17 00:37:16.160875 systemd[1]: Started cri-containerd-ebd26366c5b6ecec289186c5b1940977285d669f73b054c10a9972b5f10a93b8.scope. May 17 00:37:16.184000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fedf0710de8 items=0 ppid=2859 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:16.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562643236333636633562366563656332383931383663356231393430 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit: BPF prog-id=134 op=LOAD May 17 00:37:16.184000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000280218 items=0 ppid=2859 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:16.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562643236333636633562366563656332383931383663356231393430 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit: BPF prog-id=135 op=LOAD May 17 00:37:16.184000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000280268 items=0 ppid=2859 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:16.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562643236333636633562366563656332383931383663356231393430 May 17 00:37:16.184000 audit: BPF prog-id=135 op=UNLOAD May 17 00:37:16.184000 audit: BPF prog-id=134 op=UNLOAD May 17 00:37:16.184000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.184000 audit: BPF prog-id=136 op=LOAD May 17 00:37:16.184000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002802f8 items=0 ppid=2859 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:16.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562643236333636633562366563656332383931383663356231393430 May 17 00:37:16.206432 env[1418]: time="2025-05-17T00:37:16.205707459Z" level=info msg="StartContainer for \"ebd26366c5b6ecec289186c5b1940977285d669f73b054c10a9972b5f10a93b8\" returns successfully" May 17 00:37:17.083685 kubelet[2411]: E0517 00:37:17.083639 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ggd4c" podUID="229d7143-68c7-4436-b5a7-e1de78e6c47a" May 17 00:37:17.195876 kubelet[2411]: I0517 00:37:17.195800 2411 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-757fcdb595-bwh6p" podStartSLOduration=6.398242809 podStartE2EDuration="11.195780578s" podCreationTimestamp="2025-05-17 00:37:06 +0000 UTC" firstStartedPulling="2025-05-17 00:37:07.158952175 +0000 UTC m=+21.810897885" lastFinishedPulling="2025-05-17 00:37:11.956489944 +0000 UTC m=+26.608435654" observedRunningTime="2025-05-17 00:37:12.182065728 +0000 UTC m=+26.834011538" watchObservedRunningTime="2025-05-17 00:37:17.195780578 +0000 UTC m=+31.847726388" May 17 00:37:17.895508 env[1418]: time="2025-05-17T00:37:17.895434432Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:37:17.897978 systemd[1]: cri-containerd-ebd26366c5b6ecec289186c5b1940977285d669f73b054c10a9972b5f10a93b8.scope: Deactivated successfully. May 17 00:37:17.908793 kernel: kauditd_printk_skb: 90 callbacks suppressed May 17 00:37:17.908917 kernel: audit: type=1334 audit(1747442237.901:1022): prog-id=136 op=UNLOAD May 17 00:37:17.901000 audit: BPF prog-id=136 op=UNLOAD May 17 00:37:17.923476 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ebd26366c5b6ecec289186c5b1940977285d669f73b054c10a9972b5f10a93b8-rootfs.mount: Deactivated successfully. May 17 00:37:17.990113 kubelet[2411]: I0517 00:37:17.989961 2411 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 17 00:37:18.527853 kubelet[2411]: W0517 00:37:18.043521 2411 reflector.go:561] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.7-n-cef16a74b5" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.7-n-cef16a74b5' and this object May 17 00:37:18.527853 kubelet[2411]: E0517 00:37:18.043575 2411 reflector.go:158] "Unhandled Error" err="object-\"calico-apiserver\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:ci-3510.3.7-n-cef16a74b5\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-apiserver\": no relationship found between node 'ci-3510.3.7-n-cef16a74b5' and this object" logger="UnhandledError" May 17 00:37:18.527853 kubelet[2411]: W0517 00:37:18.043635 2411 reflector.go:561] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.7-n-cef16a74b5" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.7-n-cef16a74b5' and this object May 17 00:37:18.527853 kubelet[2411]: E0517 00:37:18.043652 2411 reflector.go:158] "Unhandled Error" err="object-\"calico-apiserver\"/\"calico-apiserver-certs\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"calico-apiserver-certs\" is forbidden: User \"system:node:ci-3510.3.7-n-cef16a74b5\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-apiserver\": no relationship found between node 'ci-3510.3.7-n-cef16a74b5' and this object" logger="UnhandledError" May 17 00:37:18.028423 systemd[1]: Created slice kubepods-burstable-pod93164114_f6fa_4bf2_9171_1b5b8bd0773e.slice. May 17 00:37:18.528521 kubelet[2411]: I0517 00:37:18.101253 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h9t8g\" (UniqueName: \"kubernetes.io/projected/cf614254-62a7-4620-98f1-308d50209507-kube-api-access-h9t8g\") pod \"calico-apiserver-5c994b7d8-c8j4r\" (UID: \"cf614254-62a7-4620-98f1-308d50209507\") " pod="calico-apiserver/calico-apiserver-5c994b7d8-c8j4r" May 17 00:37:18.528521 kubelet[2411]: I0517 00:37:18.101295 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qvmlt\" (UniqueName: \"kubernetes.io/projected/6f5898dd-362a-45eb-be33-c0265577ee40-kube-api-access-qvmlt\") pod \"coredns-7c65d6cfc9-762rf\" (UID: \"6f5898dd-362a-45eb-be33-c0265577ee40\") " pod="kube-system/coredns-7c65d6cfc9-762rf" May 17 00:37:18.528521 kubelet[2411]: I0517 00:37:18.101319 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9wrhf\" (UniqueName: \"kubernetes.io/projected/93164114-f6fa-4bf2-9171-1b5b8bd0773e-kube-api-access-9wrhf\") pod \"coredns-7c65d6cfc9-95bqg\" (UID: \"93164114-f6fa-4bf2-9171-1b5b8bd0773e\") " pod="kube-system/coredns-7c65d6cfc9-95bqg" May 17 00:37:18.528521 kubelet[2411]: I0517 00:37:18.101343 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a22d7efa-452f-4f58-901c-3556264cc279-calico-apiserver-certs\") pod \"calico-apiserver-5c994b7d8-hgp4q\" (UID: \"a22d7efa-452f-4f58-901c-3556264cc279\") " pod="calico-apiserver/calico-apiserver-5c994b7d8-hgp4q" May 17 00:37:18.528521 kubelet[2411]: I0517 00:37:18.101371 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/6c0070f8-dd11-4a02-a60b-d807c5fc3160-config\") pod \"goldmane-8f77d7b6c-shhph\" (UID: \"6c0070f8-dd11-4a02-a60b-d807c5fc3160\") " pod="calico-system/goldmane-8f77d7b6c-shhph" May 17 00:37:18.046749 systemd[1]: Created slice kubepods-besteffort-podcf614254_62a7_4620_98f1_308d50209507.slice. May 17 00:37:18.528833 kubelet[2411]: I0517 00:37:18.101392 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/6f5898dd-362a-45eb-be33-c0265577ee40-config-volume\") pod \"coredns-7c65d6cfc9-762rf\" (UID: \"6f5898dd-362a-45eb-be33-c0265577ee40\") " pod="kube-system/coredns-7c65d6cfc9-762rf" May 17 00:37:18.528833 kubelet[2411]: I0517 00:37:18.101419 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d5d9z\" (UniqueName: \"kubernetes.io/projected/347bafb1-edcc-4760-a4b8-54009b8f96fa-kube-api-access-d5d9z\") pod \"calico-kube-controllers-85557d7668-6rdqn\" (UID: \"347bafb1-edcc-4760-a4b8-54009b8f96fa\") " pod="calico-system/calico-kube-controllers-85557d7668-6rdqn" May 17 00:37:18.528833 kubelet[2411]: I0517 00:37:18.101443 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6c0070f8-dd11-4a02-a60b-d807c5fc3160-goldmane-ca-bundle\") pod \"goldmane-8f77d7b6c-shhph\" (UID: \"6c0070f8-dd11-4a02-a60b-d807c5fc3160\") " pod="calico-system/goldmane-8f77d7b6c-shhph" May 17 00:37:18.528833 kubelet[2411]: I0517 00:37:18.101546 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/93164114-f6fa-4bf2-9171-1b5b8bd0773e-config-volume\") pod \"coredns-7c65d6cfc9-95bqg\" (UID: \"93164114-f6fa-4bf2-9171-1b5b8bd0773e\") " pod="kube-system/coredns-7c65d6cfc9-95bqg" May 17 00:37:18.528833 kubelet[2411]: I0517 00:37:18.101589 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/347bafb1-edcc-4760-a4b8-54009b8f96fa-tigera-ca-bundle\") pod \"calico-kube-controllers-85557d7668-6rdqn\" (UID: \"347bafb1-edcc-4760-a4b8-54009b8f96fa\") " pod="calico-system/calico-kube-controllers-85557d7668-6rdqn" May 17 00:37:18.063935 systemd[1]: Created slice kubepods-besteffort-podc05e338a_4f12_40a1_8a27_51112ea43071.slice. May 17 00:37:18.529121 kubelet[2411]: I0517 00:37:18.101615 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fb8kq\" (UniqueName: \"kubernetes.io/projected/c05e338a-4f12-40a1-8a27-51112ea43071-kube-api-access-fb8kq\") pod \"calico-apiserver-7bd946bb48-2lg62\" (UID: \"c05e338a-4f12-40a1-8a27-51112ea43071\") " pod="calico-apiserver/calico-apiserver-7bd946bb48-2lg62" May 17 00:37:18.529121 kubelet[2411]: I0517 00:37:18.101637 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/6c0070f8-dd11-4a02-a60b-d807c5fc3160-goldmane-key-pair\") pod \"goldmane-8f77d7b6c-shhph\" (UID: \"6c0070f8-dd11-4a02-a60b-d807c5fc3160\") " pod="calico-system/goldmane-8f77d7b6c-shhph" May 17 00:37:18.529121 kubelet[2411]: I0517 00:37:18.101660 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/cf614254-62a7-4620-98f1-308d50209507-calico-apiserver-certs\") pod \"calico-apiserver-5c994b7d8-c8j4r\" (UID: \"cf614254-62a7-4620-98f1-308d50209507\") " pod="calico-apiserver/calico-apiserver-5c994b7d8-c8j4r" May 17 00:37:18.529121 kubelet[2411]: I0517 00:37:18.101682 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/f5c8c0a0-a5ae-419e-8c25-91ecabf51829-whisker-backend-key-pair\") pod \"whisker-58db6cc6f9-2m87s\" (UID: \"f5c8c0a0-a5ae-419e-8c25-91ecabf51829\") " pod="calico-system/whisker-58db6cc6f9-2m87s" May 17 00:37:18.529121 kubelet[2411]: I0517 00:37:18.101705 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f5c8c0a0-a5ae-419e-8c25-91ecabf51829-whisker-ca-bundle\") pod \"whisker-58db6cc6f9-2m87s\" (UID: \"f5c8c0a0-a5ae-419e-8c25-91ecabf51829\") " pod="calico-system/whisker-58db6cc6f9-2m87s" May 17 00:37:18.085311 systemd[1]: Created slice kubepods-burstable-pod6f5898dd_362a_45eb_be33_c0265577ee40.slice. May 17 00:37:18.529395 kubelet[2411]: I0517 00:37:18.101731 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c05e338a-4f12-40a1-8a27-51112ea43071-calico-apiserver-certs\") pod \"calico-apiserver-7bd946bb48-2lg62\" (UID: \"c05e338a-4f12-40a1-8a27-51112ea43071\") " pod="calico-apiserver/calico-apiserver-7bd946bb48-2lg62" May 17 00:37:18.529395 kubelet[2411]: I0517 00:37:18.101752 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c2rkz\" (UniqueName: \"kubernetes.io/projected/f5c8c0a0-a5ae-419e-8c25-91ecabf51829-kube-api-access-c2rkz\") pod \"whisker-58db6cc6f9-2m87s\" (UID: \"f5c8c0a0-a5ae-419e-8c25-91ecabf51829\") " pod="calico-system/whisker-58db6cc6f9-2m87s" May 17 00:37:18.529395 kubelet[2411]: I0517 00:37:18.101807 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jzznx\" (UniqueName: \"kubernetes.io/projected/6c0070f8-dd11-4a02-a60b-d807c5fc3160-kube-api-access-jzznx\") pod \"goldmane-8f77d7b6c-shhph\" (UID: \"6c0070f8-dd11-4a02-a60b-d807c5fc3160\") " pod="calico-system/goldmane-8f77d7b6c-shhph" May 17 00:37:18.529395 kubelet[2411]: I0517 00:37:18.101826 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hmk4g\" (UniqueName: \"kubernetes.io/projected/a22d7efa-452f-4f58-901c-3556264cc279-kube-api-access-hmk4g\") pod \"calico-apiserver-5c994b7d8-hgp4q\" (UID: \"a22d7efa-452f-4f58-901c-3556264cc279\") " pod="calico-apiserver/calico-apiserver-5c994b7d8-hgp4q" May 17 00:37:18.096420 systemd[1]: Created slice kubepods-besteffort-poda22d7efa_452f_4f58_901c_3556264cc279.slice. May 17 00:37:18.105349 systemd[1]: Created slice kubepods-besteffort-pod347bafb1_edcc_4760_a4b8_54009b8f96fa.slice. May 17 00:37:18.113754 systemd[1]: Created slice kubepods-besteffort-pod6c0070f8_dd11_4a02_a60b_d807c5fc3160.slice. May 17 00:37:18.119649 systemd[1]: Created slice kubepods-besteffort-podf5c8c0a0_a5ae_419e_8c25_91ecabf51829.slice. May 17 00:37:18.823735 env[1418]: time="2025-05-17T00:37:18.823588514Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-95bqg,Uid:93164114-f6fa-4bf2-9171-1b5b8bd0773e,Namespace:kube-system,Attempt:0,}" May 17 00:37:18.832566 env[1418]: time="2025-05-17T00:37:18.832526701Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-shhph,Uid:6c0070f8-dd11-4a02-a60b-d807c5fc3160,Namespace:calico-system,Attempt:0,}" May 17 00:37:18.870055 env[1418]: time="2025-05-17T00:37:18.869646478Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85557d7668-6rdqn,Uid:347bafb1-edcc-4760-a4b8-54009b8f96fa,Namespace:calico-system,Attempt:0,}" May 17 00:37:18.870055 env[1418]: time="2025-05-17T00:37:18.869774781Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-762rf,Uid:6f5898dd-362a-45eb-be33-c0265577ee40,Namespace:kube-system,Attempt:0,}" May 17 00:37:18.870055 env[1418]: time="2025-05-17T00:37:18.870010086Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-58db6cc6f9-2m87s,Uid:f5c8c0a0-a5ae-419e-8c25-91ecabf51829,Namespace:calico-system,Attempt:0,}" May 17 00:37:19.091518 systemd[1]: Created slice kubepods-besteffort-pod229d7143_68c7_4436_b5a7_e1de78e6c47a.slice. May 17 00:37:19.097479 env[1418]: time="2025-05-17T00:37:19.097183002Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ggd4c,Uid:229d7143-68c7-4436-b5a7-e1de78e6c47a,Namespace:calico-system,Attempt:0,}" May 17 00:37:19.212951 kubelet[2411]: E0517 00:37:19.212907 2411 projected.go:288] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition May 17 00:37:19.212951 kubelet[2411]: E0517 00:37:19.212945 2411 projected.go:194] Error preparing data for projected volume kube-api-access-hmk4g for pod calico-apiserver/calico-apiserver-5c994b7d8-hgp4q: failed to sync configmap cache: timed out waiting for the condition May 17 00:37:19.213234 kubelet[2411]: E0517 00:37:19.213024 2411 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/a22d7efa-452f-4f58-901c-3556264cc279-kube-api-access-hmk4g podName:a22d7efa-452f-4f58-901c-3556264cc279 nodeName:}" failed. No retries permitted until 2025-05-17 00:37:19.712999179 +0000 UTC m=+34.364944889 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-hmk4g" (UniqueName: "kubernetes.io/projected/a22d7efa-452f-4f58-901c-3556264cc279-kube-api-access-hmk4g") pod "calico-apiserver-5c994b7d8-hgp4q" (UID: "a22d7efa-452f-4f58-901c-3556264cc279") : failed to sync configmap cache: timed out waiting for the condition May 17 00:37:19.220080 kubelet[2411]: E0517 00:37:19.220037 2411 projected.go:288] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition May 17 00:37:19.220080 kubelet[2411]: E0517 00:37:19.220081 2411 projected.go:194] Error preparing data for projected volume kube-api-access-h9t8g for pod calico-apiserver/calico-apiserver-5c994b7d8-c8j4r: failed to sync configmap cache: timed out waiting for the condition May 17 00:37:19.220288 kubelet[2411]: E0517 00:37:19.220138 2411 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/cf614254-62a7-4620-98f1-308d50209507-kube-api-access-h9t8g podName:cf614254-62a7-4620-98f1-308d50209507 nodeName:}" failed. No retries permitted until 2025-05-17 00:37:19.720118425 +0000 UTC m=+34.372064135 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-h9t8g" (UniqueName: "kubernetes.io/projected/cf614254-62a7-4620-98f1-308d50209507-kube-api-access-h9t8g") pod "calico-apiserver-5c994b7d8-c8j4r" (UID: "cf614254-62a7-4620-98f1-308d50209507") : failed to sync configmap cache: timed out waiting for the condition May 17 00:37:19.220288 kubelet[2411]: E0517 00:37:19.220037 2411 projected.go:288] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition May 17 00:37:19.220288 kubelet[2411]: E0517 00:37:19.220168 2411 projected.go:194] Error preparing data for projected volume kube-api-access-fb8kq for pod calico-apiserver/calico-apiserver-7bd946bb48-2lg62: failed to sync configmap cache: timed out waiting for the condition May 17 00:37:19.220288 kubelet[2411]: E0517 00:37:19.220198 2411 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/c05e338a-4f12-40a1-8a27-51112ea43071-kube-api-access-fb8kq podName:c05e338a-4f12-40a1-8a27-51112ea43071 nodeName:}" failed. No retries permitted until 2025-05-17 00:37:19.720187726 +0000 UTC m=+34.372133436 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-fb8kq" (UniqueName: "kubernetes.io/projected/c05e338a-4f12-40a1-8a27-51112ea43071-kube-api-access-fb8kq") pod "calico-apiserver-7bd946bb48-2lg62" (UID: "c05e338a-4f12-40a1-8a27-51112ea43071") : failed to sync configmap cache: timed out waiting for the condition May 17 00:37:19.785824 env[1418]: time="2025-05-17T00:37:19.785748131Z" level=info msg="shim disconnected" id=ebd26366c5b6ecec289186c5b1940977285d669f73b054c10a9972b5f10a93b8 May 17 00:37:19.785824 env[1418]: time="2025-05-17T00:37:19.785825633Z" level=warning msg="cleaning up after shim disconnected" id=ebd26366c5b6ecec289186c5b1940977285d669f73b054c10a9972b5f10a93b8 namespace=k8s.io May 17 00:37:19.786090 env[1418]: time="2025-05-17T00:37:19.785836933Z" level=info msg="cleaning up dead shim" May 17 00:37:19.793917 env[1418]: time="2025-05-17T00:37:19.793873298Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:37:19Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3144 runtime=io.containerd.runc.v2\n" May 17 00:37:20.033020 env[1418]: time="2025-05-17T00:37:20.032971991Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c994b7d8-hgp4q,Uid:a22d7efa-452f-4f58-901c-3556264cc279,Namespace:calico-apiserver,Attempt:0,}" May 17 00:37:20.033823 env[1418]: time="2025-05-17T00:37:20.033224996Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c994b7d8-c8j4r,Uid:cf614254-62a7-4620-98f1-308d50209507,Namespace:calico-apiserver,Attempt:0,}" May 17 00:37:20.039203 env[1418]: time="2025-05-17T00:37:20.033296297Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bd946bb48-2lg62,Uid:c05e338a-4f12-40a1-8a27-51112ea43071,Namespace:calico-apiserver,Attempt:0,}" May 17 00:37:20.181783 env[1418]: time="2025-05-17T00:37:20.179812444Z" level=error msg="Failed to destroy network for sandbox \"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.181783 env[1418]: time="2025-05-17T00:37:20.180200452Z" level=error msg="encountered an error cleaning up failed sandbox \"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.181783 env[1418]: time="2025-05-17T00:37:20.180270153Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-95bqg,Uid:93164114-f6fa-4bf2-9171-1b5b8bd0773e,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.184394 kubelet[2411]: E0517 00:37:20.180518 2411 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.184394 kubelet[2411]: E0517 00:37:20.180597 2411 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-95bqg" May 17 00:37:20.184394 kubelet[2411]: E0517 00:37:20.180628 2411 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-95bqg" May 17 00:37:20.184824 kubelet[2411]: E0517 00:37:20.180689 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-95bqg_kube-system(93164114-f6fa-4bf2-9171-1b5b8bd0773e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-95bqg_kube-system(93164114-f6fa-4bf2-9171-1b5b8bd0773e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-95bqg" podUID="93164114-f6fa-4bf2-9171-1b5b8bd0773e" May 17 00:37:20.185496 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5-shm.mount: Deactivated successfully. May 17 00:37:20.204253 env[1418]: time="2025-05-17T00:37:20.200902268Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:37:20.204253 env[1418]: time="2025-05-17T00:37:20.202347597Z" level=info msg="StopPodSandbox for \"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\"" May 17 00:37:20.204457 kubelet[2411]: I0517 00:37:20.201534 2411 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" May 17 00:37:20.228986 env[1418]: time="2025-05-17T00:37:20.228926232Z" level=error msg="Failed to destroy network for sandbox \"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.229601 env[1418]: time="2025-05-17T00:37:20.229557845Z" level=error msg="encountered an error cleaning up failed sandbox \"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.229799 env[1418]: time="2025-05-17T00:37:20.229752849Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-762rf,Uid:6f5898dd-362a-45eb-be33-c0265577ee40,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.230113 kubelet[2411]: E0517 00:37:20.230073 2411 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.230235 kubelet[2411]: E0517 00:37:20.230137 2411 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-762rf" May 17 00:37:20.230235 kubelet[2411]: E0517 00:37:20.230164 2411 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-762rf" May 17 00:37:20.230235 kubelet[2411]: E0517 00:37:20.230211 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-762rf_kube-system(6f5898dd-362a-45eb-be33-c0265577ee40)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-762rf_kube-system(6f5898dd-362a-45eb-be33-c0265577ee40)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-762rf" podUID="6f5898dd-362a-45eb-be33-c0265577ee40" May 17 00:37:20.230613 env[1418]: time="2025-05-17T00:37:20.230558465Z" level=error msg="Failed to destroy network for sandbox \"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.231178 env[1418]: time="2025-05-17T00:37:20.231133476Z" level=error msg="encountered an error cleaning up failed sandbox \"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.231425 env[1418]: time="2025-05-17T00:37:20.231370181Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-58db6cc6f9-2m87s,Uid:f5c8c0a0-a5ae-419e-8c25-91ecabf51829,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.232028 kubelet[2411]: E0517 00:37:20.231992 2411 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.232129 kubelet[2411]: E0517 00:37:20.232046 2411 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-58db6cc6f9-2m87s" May 17 00:37:20.232129 kubelet[2411]: E0517 00:37:20.232069 2411 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-58db6cc6f9-2m87s" May 17 00:37:20.232234 kubelet[2411]: E0517 00:37:20.232114 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-58db6cc6f9-2m87s_calico-system(f5c8c0a0-a5ae-419e-8c25-91ecabf51829)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-58db6cc6f9-2m87s_calico-system(f5c8c0a0-a5ae-419e-8c25-91ecabf51829)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-58db6cc6f9-2m87s" podUID="f5c8c0a0-a5ae-419e-8c25-91ecabf51829" May 17 00:37:20.310144 env[1418]: time="2025-05-17T00:37:20.309988162Z" level=error msg="Failed to destroy network for sandbox \"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.311279 env[1418]: time="2025-05-17T00:37:20.311231387Z" level=error msg="encountered an error cleaning up failed sandbox \"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.311405 env[1418]: time="2025-05-17T00:37:20.311297389Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-shhph,Uid:6c0070f8-dd11-4a02-a60b-d807c5fc3160,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.311558 kubelet[2411]: E0517 00:37:20.311515 2411 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.311662 kubelet[2411]: E0517 00:37:20.311589 2411 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-8f77d7b6c-shhph" May 17 00:37:20.311662 kubelet[2411]: E0517 00:37:20.311617 2411 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-8f77d7b6c-shhph" May 17 00:37:20.311971 kubelet[2411]: E0517 00:37:20.311685 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-8f77d7b6c-shhph_calico-system(6c0070f8-dd11-4a02-a60b-d807c5fc3160)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-8f77d7b6c-shhph_calico-system(6c0070f8-dd11-4a02-a60b-d807c5fc3160)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-8f77d7b6c-shhph" podUID="6c0070f8-dd11-4a02-a60b-d807c5fc3160" May 17 00:37:20.398860 env[1418]: time="2025-05-17T00:37:20.398805449Z" level=error msg="Failed to destroy network for sandbox \"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.399335 env[1418]: time="2025-05-17T00:37:20.399283658Z" level=error msg="encountered an error cleaning up failed sandbox \"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.399458 env[1418]: time="2025-05-17T00:37:20.399347959Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ggd4c,Uid:229d7143-68c7-4436-b5a7-e1de78e6c47a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.399835 kubelet[2411]: E0517 00:37:20.399592 2411 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.399835 kubelet[2411]: E0517 00:37:20.399674 2411 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ggd4c" May 17 00:37:20.399835 kubelet[2411]: E0517 00:37:20.399711 2411 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ggd4c" May 17 00:37:20.401910 kubelet[2411]: E0517 00:37:20.399795 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-ggd4c_calico-system(229d7143-68c7-4436-b5a7-e1de78e6c47a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-ggd4c_calico-system(229d7143-68c7-4436-b5a7-e1de78e6c47a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ggd4c" podUID="229d7143-68c7-4436-b5a7-e1de78e6c47a" May 17 00:37:20.401910 kubelet[2411]: E0517 00:37:20.400826 2411 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" May 17 00:37:20.401910 kubelet[2411]: E0517 00:37:20.400875 2411 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5"} May 17 00:37:20.401910 kubelet[2411]: E0517 00:37:20.400944 2411 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"93164114-f6fa-4bf2-9171-1b5b8bd0773e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:20.402333 env[1418]: time="2025-05-17T00:37:20.400645586Z" level=error msg="StopPodSandbox for \"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\" failed" error="failed to destroy network for sandbox \"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.402397 kubelet[2411]: E0517 00:37:20.400970 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"93164114-f6fa-4bf2-9171-1b5b8bd0773e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-95bqg" podUID="93164114-f6fa-4bf2-9171-1b5b8bd0773e" May 17 00:37:20.411887 env[1418]: time="2025-05-17T00:37:20.411835611Z" level=error msg="Failed to destroy network for sandbox \"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.412400 env[1418]: time="2025-05-17T00:37:20.412358921Z" level=error msg="encountered an error cleaning up failed sandbox \"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.412563 env[1418]: time="2025-05-17T00:37:20.412526724Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85557d7668-6rdqn,Uid:347bafb1-edcc-4760-a4b8-54009b8f96fa,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.412926 kubelet[2411]: E0517 00:37:20.412891 2411 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.413026 kubelet[2411]: E0517 00:37:20.412969 2411 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-85557d7668-6rdqn" May 17 00:37:20.413026 kubelet[2411]: E0517 00:37:20.412995 2411 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-85557d7668-6rdqn" May 17 00:37:20.413128 kubelet[2411]: E0517 00:37:20.413067 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-85557d7668-6rdqn_calico-system(347bafb1-edcc-4760-a4b8-54009b8f96fa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-85557d7668-6rdqn_calico-system(347bafb1-edcc-4760-a4b8-54009b8f96fa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-85557d7668-6rdqn" podUID="347bafb1-edcc-4760-a4b8-54009b8f96fa" May 17 00:37:20.429916 env[1418]: time="2025-05-17T00:37:20.429855373Z" level=error msg="Failed to destroy network for sandbox \"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.430460 env[1418]: time="2025-05-17T00:37:20.430418984Z" level=error msg="encountered an error cleaning up failed sandbox \"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.430687 env[1418]: time="2025-05-17T00:37:20.430628889Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c994b7d8-hgp4q,Uid:a22d7efa-452f-4f58-901c-3556264cc279,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.431272 kubelet[2411]: E0517 00:37:20.431047 2411 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.431272 kubelet[2411]: E0517 00:37:20.431120 2411 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5c994b7d8-hgp4q" May 17 00:37:20.431272 kubelet[2411]: E0517 00:37:20.431145 2411 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5c994b7d8-hgp4q" May 17 00:37:20.431492 kubelet[2411]: E0517 00:37:20.431215 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5c994b7d8-hgp4q_calico-apiserver(a22d7efa-452f-4f58-901c-3556264cc279)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5c994b7d8-hgp4q_calico-apiserver(a22d7efa-452f-4f58-901c-3556264cc279)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5c994b7d8-hgp4q" podUID="a22d7efa-452f-4f58-901c-3556264cc279" May 17 00:37:20.456011 env[1418]: time="2025-05-17T00:37:20.455955498Z" level=error msg="Failed to destroy network for sandbox \"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.459038 env[1418]: time="2025-05-17T00:37:20.456344806Z" level=error msg="encountered an error cleaning up failed sandbox \"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.459038 env[1418]: time="2025-05-17T00:37:20.456418407Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bd946bb48-2lg62,Uid:c05e338a-4f12-40a1-8a27-51112ea43071,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.459413 kubelet[2411]: E0517 00:37:20.456948 2411 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.459413 kubelet[2411]: E0517 00:37:20.457014 2411 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7bd946bb48-2lg62" May 17 00:37:20.459413 kubelet[2411]: E0517 00:37:20.457040 2411 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7bd946bb48-2lg62" May 17 00:37:20.459580 kubelet[2411]: E0517 00:37:20.457101 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7bd946bb48-2lg62_calico-apiserver(c05e338a-4f12-40a1-8a27-51112ea43071)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7bd946bb48-2lg62_calico-apiserver(c05e338a-4f12-40a1-8a27-51112ea43071)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7bd946bb48-2lg62" podUID="c05e338a-4f12-40a1-8a27-51112ea43071" May 17 00:37:20.464430 env[1418]: time="2025-05-17T00:37:20.464379467Z" level=error msg="Failed to destroy network for sandbox \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.464742 env[1418]: time="2025-05-17T00:37:20.464690674Z" level=error msg="encountered an error cleaning up failed sandbox \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.464839 env[1418]: time="2025-05-17T00:37:20.464786976Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c994b7d8-c8j4r,Uid:cf614254-62a7-4620-98f1-308d50209507,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.465030 kubelet[2411]: E0517 00:37:20.464985 2411 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:20.465124 kubelet[2411]: E0517 00:37:20.465053 2411 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5c994b7d8-c8j4r" May 17 00:37:20.465124 kubelet[2411]: E0517 00:37:20.465091 2411 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5c994b7d8-c8j4r" May 17 00:37:20.465222 kubelet[2411]: E0517 00:37:20.465151 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5c994b7d8-c8j4r_calico-apiserver(cf614254-62a7-4620-98f1-308d50209507)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5c994b7d8-c8j4r_calico-apiserver(cf614254-62a7-4620-98f1-308d50209507)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5c994b7d8-c8j4r" podUID="cf614254-62a7-4620-98f1-308d50209507" May 17 00:37:21.138806 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451-shm.mount: Deactivated successfully. May 17 00:37:21.138934 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c-shm.mount: Deactivated successfully. May 17 00:37:21.139009 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae-shm.mount: Deactivated successfully. May 17 00:37:21.139089 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10-shm.mount: Deactivated successfully. May 17 00:37:21.139167 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5-shm.mount: Deactivated successfully. May 17 00:37:21.139243 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c-shm.mount: Deactivated successfully. May 17 00:37:21.139326 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f-shm.mount: Deactivated successfully. May 17 00:37:21.139402 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e-shm.mount: Deactivated successfully. May 17 00:37:21.204686 kubelet[2411]: I0517 00:37:21.204645 2411 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" May 17 00:37:21.206032 env[1418]: time="2025-05-17T00:37:21.205726296Z" level=info msg="StopPodSandbox for \"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\"" May 17 00:37:21.207240 kubelet[2411]: I0517 00:37:21.207210 2411 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" May 17 00:37:21.208152 env[1418]: time="2025-05-17T00:37:21.208092943Z" level=info msg="StopPodSandbox for \"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\"" May 17 00:37:21.210201 kubelet[2411]: I0517 00:37:21.210158 2411 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" May 17 00:37:21.210875 env[1418]: time="2025-05-17T00:37:21.210837997Z" level=info msg="StopPodSandbox for \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\"" May 17 00:37:21.212472 kubelet[2411]: I0517 00:37:21.212343 2411 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" May 17 00:37:21.213400 env[1418]: time="2025-05-17T00:37:21.213370347Z" level=info msg="StopPodSandbox for \"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\"" May 17 00:37:21.215800 kubelet[2411]: I0517 00:37:21.215441 2411 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" May 17 00:37:21.217707 env[1418]: time="2025-05-17T00:37:21.217665432Z" level=info msg="StopPodSandbox for \"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\"" May 17 00:37:21.221447 kubelet[2411]: I0517 00:37:21.220712 2411 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" May 17 00:37:21.221580 env[1418]: time="2025-05-17T00:37:21.221375405Z" level=info msg="StopPodSandbox for \"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\"" May 17 00:37:21.256946 kubelet[2411]: I0517 00:37:21.256910 2411 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" May 17 00:37:21.259679 env[1418]: time="2025-05-17T00:37:21.259562758Z" level=info msg="StopPodSandbox for \"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\"" May 17 00:37:21.281286 kubelet[2411]: I0517 00:37:21.281251 2411 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" May 17 00:37:21.301852 env[1418]: time="2025-05-17T00:37:21.301793891Z" level=info msg="StopPodSandbox for \"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\"" May 17 00:37:21.356121 env[1418]: time="2025-05-17T00:37:21.356049960Z" level=error msg="StopPodSandbox for \"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\" failed" error="failed to destroy network for sandbox \"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:21.366398 kubelet[2411]: E0517 00:37:21.366343 2411 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" May 17 00:37:21.366606 kubelet[2411]: E0517 00:37:21.366414 2411 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f"} May 17 00:37:21.366606 kubelet[2411]: E0517 00:37:21.366460 2411 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6c0070f8-dd11-4a02-a60b-d807c5fc3160\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:21.366606 kubelet[2411]: E0517 00:37:21.366489 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6c0070f8-dd11-4a02-a60b-d807c5fc3160\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-8f77d7b6c-shhph" podUID="6c0070f8-dd11-4a02-a60b-d807c5fc3160" May 17 00:37:21.418904 env[1418]: time="2025-05-17T00:37:21.417457771Z" level=error msg="StopPodSandbox for \"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\" failed" error="failed to destroy network for sandbox \"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:21.419285 env[1418]: time="2025-05-17T00:37:21.419164705Z" level=error msg="StopPodSandbox for \"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\" failed" error="failed to destroy network for sandbox \"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:21.419634 kubelet[2411]: E0517 00:37:21.419580 2411 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" May 17 00:37:21.419744 kubelet[2411]: E0517 00:37:21.419639 2411 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5"} May 17 00:37:21.419744 kubelet[2411]: E0517 00:37:21.419682 2411 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6f5898dd-362a-45eb-be33-c0265577ee40\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:21.419744 kubelet[2411]: E0517 00:37:21.419715 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6f5898dd-362a-45eb-be33-c0265577ee40\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-762rf" podUID="6f5898dd-362a-45eb-be33-c0265577ee40" May 17 00:37:21.419744 kubelet[2411]: E0517 00:37:21.419580 2411 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" May 17 00:37:21.419744 kubelet[2411]: E0517 00:37:21.419753 2411 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451"} May 17 00:37:21.420088 kubelet[2411]: E0517 00:37:21.419797 2411 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c05e338a-4f12-40a1-8a27-51112ea43071\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:21.420088 kubelet[2411]: E0517 00:37:21.419821 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c05e338a-4f12-40a1-8a27-51112ea43071\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7bd946bb48-2lg62" podUID="c05e338a-4f12-40a1-8a27-51112ea43071" May 17 00:37:21.440393 env[1418]: time="2025-05-17T00:37:21.440330322Z" level=error msg="StopPodSandbox for \"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\" failed" error="failed to destroy network for sandbox \"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:21.440824 env[1418]: time="2025-05-17T00:37:21.440611228Z" level=error msg="StopPodSandbox for \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\" failed" error="failed to destroy network for sandbox \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:21.441416 kubelet[2411]: E0517 00:37:21.441081 2411 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" May 17 00:37:21.441416 kubelet[2411]: E0517 00:37:21.441145 2411 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c"} May 17 00:37:21.441416 kubelet[2411]: E0517 00:37:21.441193 2411 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cf614254-62a7-4620-98f1-308d50209507\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:21.441416 kubelet[2411]: E0517 00:37:21.441227 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cf614254-62a7-4620-98f1-308d50209507\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5c994b7d8-c8j4r" podUID="cf614254-62a7-4620-98f1-308d50209507" May 17 00:37:21.441747 kubelet[2411]: E0517 00:37:21.441287 2411 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" May 17 00:37:21.441747 kubelet[2411]: E0517 00:37:21.441319 2411 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e"} May 17 00:37:21.441747 kubelet[2411]: E0517 00:37:21.441346 2411 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f5c8c0a0-a5ae-419e-8c25-91ecabf51829\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:21.441747 kubelet[2411]: E0517 00:37:21.441370 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f5c8c0a0-a5ae-419e-8c25-91ecabf51829\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-58db6cc6f9-2m87s" podUID="f5c8c0a0-a5ae-419e-8c25-91ecabf51829" May 17 00:37:21.446531 kubelet[2411]: I0517 00:37:21.446034 2411 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:37:21.466939 env[1418]: time="2025-05-17T00:37:21.466877846Z" level=error msg="StopPodSandbox for \"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\" failed" error="failed to destroy network for sandbox \"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:21.467898 kubelet[2411]: E0517 00:37:21.467556 2411 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" May 17 00:37:21.467898 kubelet[2411]: E0517 00:37:21.467636 2411 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10"} May 17 00:37:21.467898 kubelet[2411]: E0517 00:37:21.467777 2411 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"229d7143-68c7-4436-b5a7-e1de78e6c47a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:21.467898 kubelet[2411]: E0517 00:37:21.467851 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"229d7143-68c7-4436-b5a7-e1de78e6c47a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ggd4c" podUID="229d7143-68c7-4436-b5a7-e1de78e6c47a" May 17 00:37:21.495295 env[1418]: time="2025-05-17T00:37:21.495203804Z" level=error msg="StopPodSandbox for \"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\" failed" error="failed to destroy network for sandbox \"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:21.496157 kubelet[2411]: E0517 00:37:21.495837 2411 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" May 17 00:37:21.496157 kubelet[2411]: E0517 00:37:21.495958 2411 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c"} May 17 00:37:21.496157 kubelet[2411]: E0517 00:37:21.496006 2411 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"347bafb1-edcc-4760-a4b8-54009b8f96fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:21.496157 kubelet[2411]: E0517 00:37:21.496067 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"347bafb1-edcc-4760-a4b8-54009b8f96fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-85557d7668-6rdqn" podUID="347bafb1-edcc-4760-a4b8-54009b8f96fa" May 17 00:37:21.535998 env[1418]: time="2025-05-17T00:37:21.535916607Z" level=error msg="StopPodSandbox for \"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\" failed" error="failed to destroy network for sandbox \"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:21.536572 kubelet[2411]: E0517 00:37:21.536477 2411 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" May 17 00:37:21.536572 kubelet[2411]: E0517 00:37:21.536528 2411 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae"} May 17 00:37:21.536572 kubelet[2411]: E0517 00:37:21.536572 2411 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a22d7efa-452f-4f58-901c-3556264cc279\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:21.536906 kubelet[2411]: E0517 00:37:21.536601 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a22d7efa-452f-4f58-901c-3556264cc279\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5c994b7d8-hgp4q" podUID="a22d7efa-452f-4f58-901c-3556264cc279" May 17 00:37:21.551819 kernel: audit: type=1325 audit(1747442241.538:1023): table=filter:106 family=2 entries=21 op=nft_register_rule pid=3548 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:21.538000 audit[3548]: NETFILTER_CFG table=filter:106 family=2 entries=21 op=nft_register_rule pid=3548 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:21.538000 audit[3548]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff29144190 a2=0 a3=7fff2914417c items=0 ppid=2515 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:21.573778 kernel: audit: type=1300 audit(1747442241.538:1023): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff29144190 a2=0 a3=7fff2914417c items=0 ppid=2515 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:21.573908 kernel: audit: type=1327 audit(1747442241.538:1023): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:21.538000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:21.552000 audit[3548]: NETFILTER_CFG table=nat:107 family=2 entries=19 op=nft_register_chain pid=3548 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:21.600783 kernel: audit: type=1325 audit(1747442241.552:1024): table=nat:107 family=2 entries=19 op=nft_register_chain pid=3548 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:21.552000 audit[3548]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff29144190 a2=0 a3=7fff2914417c items=0 ppid=2515 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:21.622669 kernel: audit: type=1300 audit(1747442241.552:1024): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff29144190 a2=0 a3=7fff2914417c items=0 ppid=2515 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:21.552000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:21.634781 kernel: audit: type=1327 audit(1747442241.552:1024): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:26.976874 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1854730213.mount: Deactivated successfully. May 17 00:37:27.024687 env[1418]: time="2025-05-17T00:37:27.024632378Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:27.031854 env[1418]: time="2025-05-17T00:37:27.031811805Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:27.035009 env[1418]: time="2025-05-17T00:37:27.034975360Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:27.039877 env[1418]: time="2025-05-17T00:37:27.039841346Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:27.040249 env[1418]: time="2025-05-17T00:37:27.040214653Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:37:27.059602 env[1418]: time="2025-05-17T00:37:27.059558193Z" level=info msg="CreateContainer within sandbox \"3cedccdbd046e51ce0f14b0ade3aa39078261660d45bd6703c4c82e117077ea3\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:37:27.098056 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount245265312.mount: Deactivated successfully. May 17 00:37:27.113729 env[1418]: time="2025-05-17T00:37:27.113664545Z" level=info msg="CreateContainer within sandbox \"3cedccdbd046e51ce0f14b0ade3aa39078261660d45bd6703c4c82e117077ea3\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"0c2f6a779a69fabb45cb2e90f43be91e3f28598b97e15cf715be17755c276045\"" May 17 00:37:27.114463 env[1418]: time="2025-05-17T00:37:27.114430758Z" level=info msg="StartContainer for \"0c2f6a779a69fabb45cb2e90f43be91e3f28598b97e15cf715be17755c276045\"" May 17 00:37:27.133707 systemd[1]: Started cri-containerd-0c2f6a779a69fabb45cb2e90f43be91e3f28598b97e15cf715be17755c276045.scope. May 17 00:37:27.150000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.150000 audit[3561]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fa6c6da01b8 items=0 ppid=2859 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:27.185508 kernel: audit: type=1400 audit(1747442247.150:1025): avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.185746 kernel: audit: type=1300 audit(1747442247.150:1025): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fa6c6da01b8 items=0 ppid=2859 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:27.185805 kernel: audit: type=1327 audit(1747442247.150:1025): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063326636613737396136396661626234356362326539306634336265 May 17 00:37:27.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063326636613737396136396661626234356362326539306634336265 May 17 00:37:27.194689 env[1418]: time="2025-05-17T00:37:27.194635070Z" level=info msg="StartContainer for \"0c2f6a779a69fabb45cb2e90f43be91e3f28598b97e15cf715be17755c276045\" returns successfully" May 17 00:37:27.150000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.217951 kernel: audit: type=1400 audit(1747442247.150:1026): avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.150000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.231931 kernel: audit: type=1400 audit(1747442247.150:1026): avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.150000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.258029 kernel: audit: type=1400 audit(1747442247.150:1026): avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.258182 kernel: audit: type=1400 audit(1747442247.150:1026): avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.150000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.269612 kernel: audit: type=1400 audit(1747442247.150:1026): avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.150000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.150000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.281817 kernel: audit: type=1400 audit(1747442247.150:1026): avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.281936 kernel: audit: type=1400 audit(1747442247.150:1026): avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.150000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.150000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.150000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.150000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.150000 audit: BPF prog-id=137 op=LOAD May 17 00:37:27.150000 audit[3561]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00033e158 items=0 ppid=2859 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:27.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063326636613737396136396661626234356362326539306634336265 May 17 00:37:27.151000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.151000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.151000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.151000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.151000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.151000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.151000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.151000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.151000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.151000 audit: BPF prog-id=138 op=LOAD May 17 00:37:27.151000 audit[3561]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00033e1a8 items=0 ppid=2859 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:27.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063326636613737396136396661626234356362326539306634336265 May 17 00:37:27.151000 audit: BPF prog-id=138 op=UNLOAD May 17 00:37:27.151000 audit: BPF prog-id=137 op=UNLOAD May 17 00:37:27.151000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.151000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.151000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.151000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.151000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.151000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.151000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.151000 audit[3561]: AVC avc: denied { perfmon } for pid=3561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.151000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.151000 audit[3561]: AVC avc: denied { bpf } for pid=3561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.151000 audit: BPF prog-id=139 op=LOAD May 17 00:37:27.151000 audit[3561]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00033e238 items=0 ppid=2859 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:27.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063326636613737396136396661626234356362326539306634336265 May 17 00:37:27.323023 kubelet[2411]: I0517 00:37:27.321646 2411 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-4clln" podStartSLOduration=1.3635999970000001 podStartE2EDuration="21.321607504s" podCreationTimestamp="2025-05-17 00:37:06 +0000 UTC" firstStartedPulling="2025-05-17 00:37:07.083315065 +0000 UTC m=+21.735260775" lastFinishedPulling="2025-05-17 00:37:27.041322572 +0000 UTC m=+41.693268282" observedRunningTime="2025-05-17 00:37:27.320879191 +0000 UTC m=+41.972825001" watchObservedRunningTime="2025-05-17 00:37:27.321607504 +0000 UTC m=+41.973553214" May 17 00:37:27.868792 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:37:27.868967 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:37:27.972501 env[1418]: time="2025-05-17T00:37:27.972450755Z" level=info msg="StopPodSandbox for \"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\"" May 17 00:37:28.132022 env[1418]: 2025-05-17 00:37:28.069 [INFO][3634] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" May 17 00:37:28.132022 env[1418]: 2025-05-17 00:37:28.069 [INFO][3634] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" iface="eth0" netns="/var/run/netns/cni-d411ea5c-86f3-1a2b-d390-6fea28426dfd" May 17 00:37:28.132022 env[1418]: 2025-05-17 00:37:28.069 [INFO][3634] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" iface="eth0" netns="/var/run/netns/cni-d411ea5c-86f3-1a2b-d390-6fea28426dfd" May 17 00:37:28.132022 env[1418]: 2025-05-17 00:37:28.069 [INFO][3634] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" iface="eth0" netns="/var/run/netns/cni-d411ea5c-86f3-1a2b-d390-6fea28426dfd" May 17 00:37:28.132022 env[1418]: 2025-05-17 00:37:28.070 [INFO][3634] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" May 17 00:37:28.132022 env[1418]: 2025-05-17 00:37:28.070 [INFO][3634] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" May 17 00:37:28.132022 env[1418]: 2025-05-17 00:37:28.116 [INFO][3645] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" HandleID="k8s-pod-network.f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" Workload="ci--3510.3.7--n--cef16a74b5-k8s-whisker--58db6cc6f9--2m87s-eth0" May 17 00:37:28.132022 env[1418]: 2025-05-17 00:37:28.117 [INFO][3645] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:28.132022 env[1418]: 2025-05-17 00:37:28.117 [INFO][3645] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:28.132022 env[1418]: 2025-05-17 00:37:28.124 [WARNING][3645] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" HandleID="k8s-pod-network.f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" Workload="ci--3510.3.7--n--cef16a74b5-k8s-whisker--58db6cc6f9--2m87s-eth0" May 17 00:37:28.132022 env[1418]: 2025-05-17 00:37:28.124 [INFO][3645] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" HandleID="k8s-pod-network.f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" Workload="ci--3510.3.7--n--cef16a74b5-k8s-whisker--58db6cc6f9--2m87s-eth0" May 17 00:37:28.132022 env[1418]: 2025-05-17 00:37:28.127 [INFO][3645] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:28.132022 env[1418]: 2025-05-17 00:37:28.130 [INFO][3634] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" May 17 00:37:28.136483 systemd[1]: run-netns-cni\x2dd411ea5c\x2d86f3\x2d1a2b\x2dd390\x2d6fea28426dfd.mount: Deactivated successfully. May 17 00:37:28.136899 env[1418]: time="2025-05-17T00:37:28.136579100Z" level=info msg="TearDown network for sandbox \"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\" successfully" May 17 00:37:28.136899 env[1418]: time="2025-05-17T00:37:28.136631201Z" level=info msg="StopPodSandbox for \"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\" returns successfully" May 17 00:37:28.286404 kubelet[2411]: I0517 00:37:28.286333 2411 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f5c8c0a0-a5ae-419e-8c25-91ecabf51829-whisker-ca-bundle\") pod \"f5c8c0a0-a5ae-419e-8c25-91ecabf51829\" (UID: \"f5c8c0a0-a5ae-419e-8c25-91ecabf51829\") " May 17 00:37:28.286404 kubelet[2411]: I0517 00:37:28.286408 2411 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-c2rkz\" (UniqueName: \"kubernetes.io/projected/f5c8c0a0-a5ae-419e-8c25-91ecabf51829-kube-api-access-c2rkz\") pod \"f5c8c0a0-a5ae-419e-8c25-91ecabf51829\" (UID: \"f5c8c0a0-a5ae-419e-8c25-91ecabf51829\") " May 17 00:37:28.286721 kubelet[2411]: I0517 00:37:28.286444 2411 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/f5c8c0a0-a5ae-419e-8c25-91ecabf51829-whisker-backend-key-pair\") pod \"f5c8c0a0-a5ae-419e-8c25-91ecabf51829\" (UID: \"f5c8c0a0-a5ae-419e-8c25-91ecabf51829\") " May 17 00:37:28.287535 kubelet[2411]: I0517 00:37:28.287399 2411 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/f5c8c0a0-a5ae-419e-8c25-91ecabf51829-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "f5c8c0a0-a5ae-419e-8c25-91ecabf51829" (UID: "f5c8c0a0-a5ae-419e-8c25-91ecabf51829"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 17 00:37:28.294355 systemd[1]: var-lib-kubelet-pods-f5c8c0a0\x2da5ae\x2d419e\x2d8c25\x2d91ecabf51829-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. May 17 00:37:28.295595 kubelet[2411]: I0517 00:37:28.295088 2411 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/f5c8c0a0-a5ae-419e-8c25-91ecabf51829-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "f5c8c0a0-a5ae-419e-8c25-91ecabf51829" (UID: "f5c8c0a0-a5ae-419e-8c25-91ecabf51829"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGidValue "" May 17 00:37:28.301648 systemd[1]: var-lib-kubelet-pods-f5c8c0a0\x2da5ae\x2d419e\x2d8c25\x2d91ecabf51829-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dc2rkz.mount: Deactivated successfully. May 17 00:37:28.304112 kubelet[2411]: I0517 00:37:28.302560 2411 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/f5c8c0a0-a5ae-419e-8c25-91ecabf51829-kube-api-access-c2rkz" (OuterVolumeSpecName: "kube-api-access-c2rkz") pod "f5c8c0a0-a5ae-419e-8c25-91ecabf51829" (UID: "f5c8c0a0-a5ae-419e-8c25-91ecabf51829"). InnerVolumeSpecName "kube-api-access-c2rkz". PluginName "kubernetes.io/projected", VolumeGidValue "" May 17 00:37:28.387602 kubelet[2411]: I0517 00:37:28.387475 2411 reconciler_common.go:293] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f5c8c0a0-a5ae-419e-8c25-91ecabf51829-whisker-ca-bundle\") on node \"ci-3510.3.7-n-cef16a74b5\" DevicePath \"\"" May 17 00:37:28.387602 kubelet[2411]: I0517 00:37:28.387505 2411 reconciler_common.go:293] "Volume detached for volume \"kube-api-access-c2rkz\" (UniqueName: \"kubernetes.io/projected/f5c8c0a0-a5ae-419e-8c25-91ecabf51829-kube-api-access-c2rkz\") on node \"ci-3510.3.7-n-cef16a74b5\" DevicePath \"\"" May 17 00:37:28.387602 kubelet[2411]: I0517 00:37:28.387522 2411 reconciler_common.go:293] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/f5c8c0a0-a5ae-419e-8c25-91ecabf51829-whisker-backend-key-pair\") on node \"ci-3510.3.7-n-cef16a74b5\" DevicePath \"\"" May 17 00:37:28.602339 systemd[1]: Removed slice kubepods-besteffort-podf5c8c0a0_a5ae_419e_8c25_91ecabf51829.slice. May 17 00:37:28.685008 systemd[1]: Created slice kubepods-besteffort-poda3dfc93e_f9da_4eec_b12c_30e9f327b06d.slice. May 17 00:37:28.790917 kubelet[2411]: I0517 00:37:28.790831 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/a3dfc93e-f9da-4eec-b12c-30e9f327b06d-whisker-backend-key-pair\") pod \"whisker-55d4b57f4c-xrphf\" (UID: \"a3dfc93e-f9da-4eec-b12c-30e9f327b06d\") " pod="calico-system/whisker-55d4b57f4c-xrphf" May 17 00:37:28.791123 kubelet[2411]: I0517 00:37:28.790943 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a3dfc93e-f9da-4eec-b12c-30e9f327b06d-whisker-ca-bundle\") pod \"whisker-55d4b57f4c-xrphf\" (UID: \"a3dfc93e-f9da-4eec-b12c-30e9f327b06d\") " pod="calico-system/whisker-55d4b57f4c-xrphf" May 17 00:37:28.791123 kubelet[2411]: I0517 00:37:28.790973 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z79vf\" (UniqueName: \"kubernetes.io/projected/a3dfc93e-f9da-4eec-b12c-30e9f327b06d-kube-api-access-z79vf\") pod \"whisker-55d4b57f4c-xrphf\" (UID: \"a3dfc93e-f9da-4eec-b12c-30e9f327b06d\") " pod="calico-system/whisker-55d4b57f4c-xrphf" May 17 00:37:28.981657 systemd[1]: run-containerd-runc-k8s.io-0c2f6a779a69fabb45cb2e90f43be91e3f28598b97e15cf715be17755c276045-runc.4I2ETV.mount: Deactivated successfully. May 17 00:37:28.991263 env[1418]: time="2025-05-17T00:37:28.991216668Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-55d4b57f4c-xrphf,Uid:a3dfc93e-f9da-4eec-b12c-30e9f327b06d,Namespace:calico-system,Attempt:0,}" May 17 00:37:29.155689 systemd-networkd[1573]: calic1a7e8106a8: Link UP May 17 00:37:29.166883 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:37:29.167009 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic1a7e8106a8: link becomes ready May 17 00:37:29.167207 systemd-networkd[1573]: calic1a7e8106a8: Gained carrier May 17 00:37:29.183995 env[1418]: 2025-05-17 00:37:29.068 [INFO][3686] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:37:29.183995 env[1418]: 2025-05-17 00:37:29.078 [INFO][3686] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--cef16a74b5-k8s-whisker--55d4b57f4c--xrphf-eth0 whisker-55d4b57f4c- calico-system a3dfc93e-f9da-4eec-b12c-30e9f327b06d 910 0 2025-05-17 00:37:28 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:55d4b57f4c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s ci-3510.3.7-n-cef16a74b5 whisker-55d4b57f4c-xrphf eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] calic1a7e8106a8 [] [] }} ContainerID="c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce" Namespace="calico-system" Pod="whisker-55d4b57f4c-xrphf" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-whisker--55d4b57f4c--xrphf-" May 17 00:37:29.183995 env[1418]: 2025-05-17 00:37:29.078 [INFO][3686] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce" Namespace="calico-system" Pod="whisker-55d4b57f4c-xrphf" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-whisker--55d4b57f4c--xrphf-eth0" May 17 00:37:29.183995 env[1418]: 2025-05-17 00:37:29.104 [INFO][3699] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce" HandleID="k8s-pod-network.c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce" Workload="ci--3510.3.7--n--cef16a74b5-k8s-whisker--55d4b57f4c--xrphf-eth0" May 17 00:37:29.183995 env[1418]: 2025-05-17 00:37:29.104 [INFO][3699] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce" HandleID="k8s-pod-network.c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce" Workload="ci--3510.3.7--n--cef16a74b5-k8s-whisker--55d4b57f4c--xrphf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9660), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-cef16a74b5", "pod":"whisker-55d4b57f4c-xrphf", "timestamp":"2025-05-17 00:37:29.104482993 +0000 UTC"}, Hostname:"ci-3510.3.7-n-cef16a74b5", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:37:29.183995 env[1418]: 2025-05-17 00:37:29.104 [INFO][3699] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:29.183995 env[1418]: 2025-05-17 00:37:29.104 [INFO][3699] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:29.183995 env[1418]: 2025-05-17 00:37:29.104 [INFO][3699] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-cef16a74b5' May 17 00:37:29.183995 env[1418]: 2025-05-17 00:37:29.111 [INFO][3699] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:29.183995 env[1418]: 2025-05-17 00:37:29.115 [INFO][3699] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:29.183995 env[1418]: 2025-05-17 00:37:29.119 [INFO][3699] ipam/ipam.go 511: Trying affinity for 192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:29.183995 env[1418]: 2025-05-17 00:37:29.121 [INFO][3699] ipam/ipam.go 158: Attempting to load block cidr=192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:29.183995 env[1418]: 2025-05-17 00:37:29.122 [INFO][3699] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:29.183995 env[1418]: 2025-05-17 00:37:29.122 [INFO][3699] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.34.192/26 handle="k8s-pod-network.c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:29.183995 env[1418]: 2025-05-17 00:37:29.124 [INFO][3699] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce May 17 00:37:29.183995 env[1418]: 2025-05-17 00:37:29.133 [INFO][3699] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.34.192/26 handle="k8s-pod-network.c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:29.183995 env[1418]: 2025-05-17 00:37:29.140 [INFO][3699] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.34.193/26] block=192.168.34.192/26 handle="k8s-pod-network.c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:29.183995 env[1418]: 2025-05-17 00:37:29.140 [INFO][3699] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.34.193/26] handle="k8s-pod-network.c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:29.183995 env[1418]: 2025-05-17 00:37:29.140 [INFO][3699] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:29.183995 env[1418]: 2025-05-17 00:37:29.140 [INFO][3699] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.193/26] IPv6=[] ContainerID="c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce" HandleID="k8s-pod-network.c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce" Workload="ci--3510.3.7--n--cef16a74b5-k8s-whisker--55d4b57f4c--xrphf-eth0" May 17 00:37:29.186077 env[1418]: 2025-05-17 00:37:29.141 [INFO][3686] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce" Namespace="calico-system" Pod="whisker-55d4b57f4c-xrphf" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-whisker--55d4b57f4c--xrphf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-whisker--55d4b57f4c--xrphf-eth0", GenerateName:"whisker-55d4b57f4c-", Namespace:"calico-system", SelfLink:"", UID:"a3dfc93e-f9da-4eec-b12c-30e9f327b06d", ResourceVersion:"910", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"55d4b57f4c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"", Pod:"whisker-55d4b57f4c-xrphf", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.34.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calic1a7e8106a8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:29.186077 env[1418]: 2025-05-17 00:37:29.142 [INFO][3686] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.34.193/32] ContainerID="c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce" Namespace="calico-system" Pod="whisker-55d4b57f4c-xrphf" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-whisker--55d4b57f4c--xrphf-eth0" May 17 00:37:29.186077 env[1418]: 2025-05-17 00:37:29.142 [INFO][3686] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic1a7e8106a8 ContainerID="c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce" Namespace="calico-system" Pod="whisker-55d4b57f4c-xrphf" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-whisker--55d4b57f4c--xrphf-eth0" May 17 00:37:29.186077 env[1418]: 2025-05-17 00:37:29.167 [INFO][3686] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce" Namespace="calico-system" Pod="whisker-55d4b57f4c-xrphf" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-whisker--55d4b57f4c--xrphf-eth0" May 17 00:37:29.186077 env[1418]: 2025-05-17 00:37:29.168 [INFO][3686] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce" Namespace="calico-system" Pod="whisker-55d4b57f4c-xrphf" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-whisker--55d4b57f4c--xrphf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-whisker--55d4b57f4c--xrphf-eth0", GenerateName:"whisker-55d4b57f4c-", Namespace:"calico-system", SelfLink:"", UID:"a3dfc93e-f9da-4eec-b12c-30e9f327b06d", ResourceVersion:"910", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"55d4b57f4c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce", Pod:"whisker-55d4b57f4c-xrphf", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.34.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calic1a7e8106a8", MAC:"ca:bd:31:af:0a:93", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:29.186077 env[1418]: 2025-05-17 00:37:29.182 [INFO][3686] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce" Namespace="calico-system" Pod="whisker-55d4b57f4c-xrphf" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-whisker--55d4b57f4c--xrphf-eth0" May 17 00:37:29.199806 env[1418]: time="2025-05-17T00:37:29.199703510Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:29.199806 env[1418]: time="2025-05-17T00:37:29.199741010Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:29.199806 env[1418]: time="2025-05-17T00:37:29.199782011Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:29.200292 env[1418]: time="2025-05-17T00:37:29.200230518Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce pid=3721 runtime=io.containerd.runc.v2 May 17 00:37:29.229398 systemd[1]: Started cri-containerd-c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce.scope. May 17 00:37:29.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.244000 audit: BPF prog-id=140 op=LOAD May 17 00:37:29.245000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3721 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336323531666333613733623261313138396639396432346633323431 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=3721 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336323531666333613733623261313138396639396432346633323431 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit: BPF prog-id=141 op=LOAD May 17 00:37:29.245000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0003c4660 items=0 ppid=3721 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336323531666333613733623261313138396639396432346633323431 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit: BPF prog-id=142 op=LOAD May 17 00:37:29.245000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0003c46a8 items=0 ppid=3721 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336323531666333613733623261313138396639396432346633323431 May 17 00:37:29.245000 audit: BPF prog-id=142 op=UNLOAD May 17 00:37:29.245000 audit: BPF prog-id=141 op=UNLOAD May 17 00:37:29.245000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.245000 audit: BPF prog-id=143 op=LOAD May 17 00:37:29.245000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003c4ab8 items=0 ppid=3721 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336323531666333613733623261313138396639396432346633323431 May 17 00:37:29.304000 audit[3781]: AVC avc: denied { write } for pid=3781 comm="tee" name="fd" dev="proc" ino=30169 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:29.314901 env[1418]: time="2025-05-17T00:37:29.314837764Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-55d4b57f4c-xrphf,Uid:a3dfc93e-f9da-4eec-b12c-30e9f327b06d,Namespace:calico-system,Attempt:0,} returns sandbox id \"c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce\"" May 17 00:37:29.316994 env[1418]: time="2025-05-17T00:37:29.316960500Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:37:29.304000 audit[3781]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1a18a7cc a2=241 a3=1b6 items=1 ppid=3769 pid=3781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.304000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:37:29.328000 audit[3784]: AVC avc: denied { write } for pid=3784 comm="tee" name="fd" dev="proc" ino=30189 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:29.304000 audit: PATH item=0 name="/dev/fd/63" inode=30149 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:29.304000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:29.328000 audit[3784]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff61bd67bb a2=241 a3=1b6 items=1 ppid=3760 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.328000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:37:29.328000 audit: PATH item=0 name="/dev/fd/63" inode=30152 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:29.328000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:29.338000 audit[3797]: AVC avc: denied { write } for pid=3797 comm="tee" name="fd" dev="proc" ino=30199 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:29.343000 audit[3819]: AVC avc: denied { write } for pid=3819 comm="tee" name="fd" dev="proc" ino=30914 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:29.343000 audit[3819]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc220807cd a2=241 a3=1b6 items=1 ppid=3775 pid=3819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.343000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:37:29.343000 audit: PATH item=0 name="/dev/fd/63" inode=30911 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:29.343000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:29.338000 audit[3797]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc09b4d7cb a2=241 a3=1b6 items=1 ppid=3759 pid=3797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.338000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:37:29.338000 audit: PATH item=0 name="/dev/fd/63" inode=30170 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:29.338000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:29.355000 audit[3810]: AVC avc: denied { write } for pid=3810 comm="tee" name="fd" dev="proc" ino=30208 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:29.355000 audit[3810]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd69c9a7bc a2=241 a3=1b6 items=1 ppid=3762 pid=3810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.355000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:37:29.355000 audit: PATH item=0 name="/dev/fd/63" inode=30906 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:29.355000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:29.362000 audit[3817]: AVC avc: denied { write } for pid=3817 comm="tee" name="fd" dev="proc" ino=30215 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:29.362000 audit[3817]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd3eb4d7cb a2=241 a3=1b6 items=1 ppid=3765 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.362000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:37:29.362000 audit: PATH item=0 name="/dev/fd/63" inode=30196 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:29.362000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:29.384000 audit[3827]: AVC avc: denied { write } for pid=3827 comm="tee" name="fd" dev="proc" ino=30221 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:29.384000 audit[3827]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0453f7cb a2=241 a3=1b6 items=1 ppid=3770 pid=3827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.384000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:37:29.384000 audit: PATH item=0 name="/dev/fd/63" inode=30212 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:29.384000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:29.522608 env[1418]: time="2025-05-17T00:37:29.522432087Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:37:29.525523 env[1418]: time="2025-05-17T00:37:29.525464239Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:37:29.526267 kubelet[2411]: E0517 00:37:29.525793 2411 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:37:29.526267 kubelet[2411]: E0517 00:37:29.525859 2411 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:37:29.526708 kubelet[2411]: E0517 00:37:29.526000 2411 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:26dea4d59cac475bbf848f70692bf24a,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-z79vf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-55d4b57f4c-xrphf_calico-system(a3dfc93e-f9da-4eec-b12c-30e9f327b06d): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:37:29.528747 env[1418]: time="2025-05-17T00:37:29.528717894Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:37:29.700000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.700000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.700000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.700000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.700000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.700000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.700000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.700000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.700000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.700000 audit: BPF prog-id=144 op=LOAD May 17 00:37:29.700000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe11590400 a2=98 a3=3 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.700000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.700000 audit: BPF prog-id=144 op=UNLOAD May 17 00:37:29.700000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.700000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.700000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.700000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.700000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.700000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.700000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.700000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.700000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.700000 audit: BPF prog-id=145 op=LOAD May 17 00:37:29.700000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe115901f0 a2=94 a3=54428f items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.700000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.701000 audit: BPF prog-id=145 op=UNLOAD May 17 00:37:29.701000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.701000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.701000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.701000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.701000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.701000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.701000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.701000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.701000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.701000 audit: BPF prog-id=146 op=LOAD May 17 00:37:29.701000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe11590220 a2=94 a3=2 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.701000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.701000 audit: BPF prog-id=146 op=UNLOAD May 17 00:37:29.709170 env[1418]: time="2025-05-17T00:37:29.708847351Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:37:29.732327 env[1418]: time="2025-05-17T00:37:29.732250648Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:37:29.733310 kubelet[2411]: E0517 00:37:29.732798 2411 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:37:29.733310 kubelet[2411]: E0517 00:37:29.732856 2411 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:37:29.733532 kubelet[2411]: E0517 00:37:29.733234 2411 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-z79vf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-55d4b57f4c-xrphf_calico-system(a3dfc93e-f9da-4eec-b12c-30e9f327b06d): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:37:29.736922 kubelet[2411]: E0517 00:37:29.736843 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-55d4b57f4c-xrphf" podUID="a3dfc93e-f9da-4eec-b12c-30e9f327b06d" May 17 00:37:29.835000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.835000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.835000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.835000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.835000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.835000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.835000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.835000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.835000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.835000 audit: BPF prog-id=147 op=LOAD May 17 00:37:29.835000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe115900e0 a2=94 a3=1 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.835000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.835000 audit: BPF prog-id=147 op=UNLOAD May 17 00:37:29.835000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.835000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe115901b0 a2=50 a3=7ffe11590290 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.835000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.845000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.845000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe115900f0 a2=28 a3=0 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.845000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.845000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.845000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe11590120 a2=28 a3=0 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.845000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.845000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.845000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe11590030 a2=28 a3=0 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.845000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.845000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.845000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe11590140 a2=28 a3=0 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.845000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.845000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.845000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe11590120 a2=28 a3=0 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.845000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.845000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.845000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe11590110 a2=28 a3=0 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.845000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.845000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.845000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe11590140 a2=28 a3=0 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.845000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.845000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.845000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe11590120 a2=28 a3=0 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.845000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.846000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe11590140 a2=28 a3=0 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.846000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.846000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe11590110 a2=28 a3=0 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.846000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.846000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe11590180 a2=28 a3=0 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.846000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.846000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe1158ff30 a2=50 a3=1 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.846000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.846000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit: BPF prog-id=148 op=LOAD May 17 00:37:29.846000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe1158ff30 a2=94 a3=5 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.846000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.846000 audit: BPF prog-id=148 op=UNLOAD May 17 00:37:29.846000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe1158ffe0 a2=50 a3=1 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.846000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.846000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe11590100 a2=4 a3=38 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.846000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.846000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.846000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:29.846000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe11590150 a2=94 a3=6 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.846000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.847000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.847000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.847000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.847000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.847000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.847000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.847000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.847000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.847000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.847000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.847000 audit[3869]: AVC avc: denied { confidentiality } for pid=3869 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:29.847000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe1158f900 a2=94 a3=88 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.847000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.847000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.847000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.847000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.847000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.847000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.847000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.847000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.847000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe1158f900 a2=94 a3=88 items=0 ppid=3764 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:29.856000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit: BPF prog-id=149 op=LOAD May 17 00:37:29.856000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd77ef9c30 a2=98 a3=1999999999999999 items=0 ppid=3764 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.856000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:37:29.856000 audit: BPF prog-id=149 op=UNLOAD May 17 00:37:29.856000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit: BPF prog-id=150 op=LOAD May 17 00:37:29.856000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd77ef9b10 a2=94 a3=ffff items=0 ppid=3764 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.856000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:37:29.856000 audit: BPF prog-id=150 op=UNLOAD May 17 00:37:29.856000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:29.856000 audit: BPF prog-id=151 op=LOAD May 17 00:37:29.856000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd77ef9b50 a2=94 a3=7ffd77ef9d30 items=0 ppid=3764 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:29.856000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:37:29.856000 audit: BPF prog-id=151 op=UNLOAD May 17 00:37:29.979906 systemd[1]: run-containerd-runc-k8s.io-c6251fc3a73b2a1189f99d24f3241efe95245ab456a7192fe8e0f28911eb48ce-runc.0IAHMh.mount: Deactivated successfully. May 17 00:37:30.071956 systemd-networkd[1573]: vxlan.calico: Link UP May 17 00:37:30.071966 systemd-networkd[1573]: vxlan.calico: Gained carrier May 17 00:37:30.087483 kubelet[2411]: I0517 00:37:30.087230 2411 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="f5c8c0a0-a5ae-419e-8c25-91ecabf51829" path="/var/lib/kubelet/pods/f5c8c0a0-a5ae-419e-8c25-91ecabf51829/volumes" May 17 00:37:30.095000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit: BPF prog-id=152 op=LOAD May 17 00:37:30.095000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd11cb68e0 a2=98 a3=0 items=0 ppid=3764 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.095000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.095000 audit: BPF prog-id=152 op=UNLOAD May 17 00:37:30.095000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit: BPF prog-id=153 op=LOAD May 17 00:37:30.095000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd11cb66f0 a2=94 a3=54428f items=0 ppid=3764 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.095000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.095000 audit: BPF prog-id=153 op=UNLOAD May 17 00:37:30.095000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.095000 audit: BPF prog-id=154 op=LOAD May 17 00:37:30.095000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd11cb6720 a2=94 a3=2 items=0 ppid=3764 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.095000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.096000 audit: BPF prog-id=154 op=UNLOAD May 17 00:37:30.096000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.096000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd11cb65f0 a2=28 a3=0 items=0 ppid=3764 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.096000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.096000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.096000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd11cb6620 a2=28 a3=0 items=0 ppid=3764 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.096000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.096000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.096000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd11cb6530 a2=28 a3=0 items=0 ppid=3764 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.096000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.096000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.096000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd11cb6640 a2=28 a3=0 items=0 ppid=3764 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.096000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.096000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.096000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd11cb6620 a2=28 a3=0 items=0 ppid=3764 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.096000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.096000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.096000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd11cb6610 a2=28 a3=0 items=0 ppid=3764 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.096000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.096000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.096000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd11cb6640 a2=28 a3=0 items=0 ppid=3764 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.096000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.096000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.096000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd11cb6620 a2=28 a3=0 items=0 ppid=3764 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.096000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.096000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.096000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd11cb6640 a2=28 a3=0 items=0 ppid=3764 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.096000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.096000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.096000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd11cb6610 a2=28 a3=0 items=0 ppid=3764 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.096000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.096000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.096000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd11cb6680 a2=28 a3=0 items=0 ppid=3764 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.096000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.096000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.096000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.096000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.096000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.096000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.096000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.096000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.096000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.096000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.096000 audit: BPF prog-id=155 op=LOAD May 17 00:37:30.096000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd11cb64f0 a2=94 a3=0 items=0 ppid=3764 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.096000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.096000 audit: BPF prog-id=155 op=UNLOAD May 17 00:37:30.110000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd11cb64e0 a2=50 a3=2800 items=0 ppid=3764 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.110000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.110000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd11cb64e0 a2=50 a3=2800 items=0 ppid=3764 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.110000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.110000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit: BPF prog-id=156 op=LOAD May 17 00:37:30.110000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd11cb5d00 a2=94 a3=2 items=0 ppid=3764 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.110000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.110000 audit: BPF prog-id=156 op=UNLOAD May 17 00:37:30.110000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit[3897]: AVC avc: denied { perfmon } for pid=3897 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit[3897]: AVC avc: denied { bpf } for pid=3897 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.110000 audit: BPF prog-id=157 op=LOAD May 17 00:37:30.110000 audit[3897]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd11cb5e00 a2=94 a3=30 items=0 ppid=3764 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.110000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit: BPF prog-id=158 op=LOAD May 17 00:37:30.119000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc07962770 a2=98 a3=0 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.119000 audit: BPF prog-id=158 op=UNLOAD May 17 00:37:30.119000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit: BPF prog-id=159 op=LOAD May 17 00:37:30.119000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc07962560 a2=94 a3=54428f items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.119000 audit: BPF prog-id=159 op=UNLOAD May 17 00:37:30.119000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.119000 audit: BPF prog-id=160 op=LOAD May 17 00:37:30.119000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc07962590 a2=94 a3=2 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.119000 audit: BPF prog-id=160 op=UNLOAD May 17 00:37:30.245000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.245000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.245000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.245000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.245000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.245000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.245000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.245000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.245000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.245000 audit: BPF prog-id=161 op=LOAD May 17 00:37:30.245000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc07962450 a2=94 a3=1 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.245000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.245000 audit: BPF prog-id=161 op=UNLOAD May 17 00:37:30.245000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.245000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc07962520 a2=50 a3=7ffc07962600 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.245000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc07962460 a2=28 a3=0 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.255000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc07962490 a2=28 a3=0 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.255000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc079623a0 a2=28 a3=0 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.255000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc079624b0 a2=28 a3=0 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.255000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc07962490 a2=28 a3=0 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.255000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc07962480 a2=28 a3=0 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.255000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc079624b0 a2=28 a3=0 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.255000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc07962490 a2=28 a3=0 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.255000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc079624b0 a2=28 a3=0 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.255000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc07962480 a2=28 a3=0 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.255000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc079624f0 a2=28 a3=0 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.255000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc079622a0 a2=50 a3=1 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.255000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit: BPF prog-id=162 op=LOAD May 17 00:37:30.255000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc079622a0 a2=94 a3=5 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.255000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.255000 audit: BPF prog-id=162 op=UNLOAD May 17 00:37:30.255000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc07962350 a2=50 a3=1 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.255000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc07962470 a2=4 a3=38 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.255000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.255000 audit[3901]: AVC avc: denied { confidentiality } for pid=3901 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:30.255000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc079624c0 a2=94 a3=6 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.255000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.256000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.256000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.256000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.256000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.256000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.256000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.256000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.256000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.256000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.256000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.256000 audit[3901]: AVC avc: denied { confidentiality } for pid=3901 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:30.256000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc07961c70 a2=94 a3=88 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.256000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.256000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.256000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.256000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.256000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.256000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.256000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.256000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.256000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.256000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc07961c70 a2=94 a3=88 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.256000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.257000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.257000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc079636a0 a2=10 a3=f8f00800 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.257000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.257000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.257000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc07963540 a2=10 a3=3 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.257000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.257000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.257000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc079634e0 a2=10 a3=3 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.257000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.257000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:30.257000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc079634e0 a2=10 a3=7 items=0 ppid=3764 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.257000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:30.264000 audit: BPF prog-id=157 op=UNLOAD May 17 00:37:30.303856 kubelet[2411]: E0517 00:37:30.303788 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-55d4b57f4c-xrphf" podUID="a3dfc93e-f9da-4eec-b12c-30e9f327b06d" May 17 00:37:30.332000 audit[3917]: NETFILTER_CFG table=filter:108 family=2 entries=20 op=nft_register_rule pid=3917 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:30.332000 audit[3917]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffde37a48b0 a2=0 a3=7ffde37a489c items=0 ppid=2515 pid=3917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.332000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:30.336000 audit[3917]: NETFILTER_CFG table=nat:109 family=2 entries=14 op=nft_register_rule pid=3917 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:30.336000 audit[3917]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffde37a48b0 a2=0 a3=0 items=0 ppid=2515 pid=3917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.336000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:30.617000 audit[3933]: NETFILTER_CFG table=mangle:110 family=2 entries=16 op=nft_register_chain pid=3933 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:30.617000 audit[3933]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffceede0450 a2=0 a3=7ffceede043c items=0 ppid=3764 pid=3933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.617000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:30.681000 audit[3931]: NETFILTER_CFG table=nat:111 family=2 entries=15 op=nft_register_chain pid=3931 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:30.681000 audit[3931]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe19aa73b0 a2=0 a3=7ffe19aa739c items=0 ppid=3764 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.681000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:30.734000 audit[3930]: NETFILTER_CFG table=raw:112 family=2 entries=21 op=nft_register_chain pid=3930 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:30.734000 audit[3930]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc56937220 a2=0 a3=7ffc5693720c items=0 ppid=3764 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.734000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:30.750000 audit[3935]: NETFILTER_CFG table=filter:113 family=2 entries=94 op=nft_register_chain pid=3935 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:30.750000 audit[3935]: SYSCALL arch=c000003e syscall=46 success=yes exit=53116 a0=3 a1=7ffc1e201700 a2=0 a3=564944727000 items=0 ppid=3764 pid=3935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.750000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:31.213001 systemd-networkd[1573]: calic1a7e8106a8: Gained IPv6LL May 17 00:37:31.306659 kubelet[2411]: E0517 00:37:31.306559 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-55d4b57f4c-xrphf" podUID="a3dfc93e-f9da-4eec-b12c-30e9f327b06d" May 17 00:37:31.789162 systemd-networkd[1573]: vxlan.calico: Gained IPv6LL May 17 00:37:32.087158 env[1418]: time="2025-05-17T00:37:32.085306934Z" level=info msg="StopPodSandbox for \"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\"" May 17 00:37:32.087158 env[1418]: time="2025-05-17T00:37:32.086602155Z" level=info msg="StopPodSandbox for \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\"" May 17 00:37:32.216026 env[1418]: 2025-05-17 00:37:32.166 [INFO][3968] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" May 17 00:37:32.216026 env[1418]: 2025-05-17 00:37:32.167 [INFO][3968] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" iface="eth0" netns="/var/run/netns/cni-a1449f6e-201c-ca52-70d5-15ebf02a8c4d" May 17 00:37:32.216026 env[1418]: 2025-05-17 00:37:32.167 [INFO][3968] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" iface="eth0" netns="/var/run/netns/cni-a1449f6e-201c-ca52-70d5-15ebf02a8c4d" May 17 00:37:32.216026 env[1418]: 2025-05-17 00:37:32.167 [INFO][3968] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" iface="eth0" netns="/var/run/netns/cni-a1449f6e-201c-ca52-70d5-15ebf02a8c4d" May 17 00:37:32.216026 env[1418]: 2025-05-17 00:37:32.167 [INFO][3968] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" May 17 00:37:32.216026 env[1418]: 2025-05-17 00:37:32.167 [INFO][3968] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" May 17 00:37:32.216026 env[1418]: 2025-05-17 00:37:32.196 [INFO][3983] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" HandleID="k8s-pod-network.84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:32.216026 env[1418]: 2025-05-17 00:37:32.196 [INFO][3983] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:32.216026 env[1418]: 2025-05-17 00:37:32.196 [INFO][3983] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:32.216026 env[1418]: 2025-05-17 00:37:32.203 [WARNING][3983] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" HandleID="k8s-pod-network.84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:32.216026 env[1418]: 2025-05-17 00:37:32.204 [INFO][3983] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" HandleID="k8s-pod-network.84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:32.216026 env[1418]: 2025-05-17 00:37:32.211 [INFO][3983] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:32.216026 env[1418]: 2025-05-17 00:37:32.214 [INFO][3968] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" May 17 00:37:32.219985 systemd[1]: run-netns-cni\x2da1449f6e\x2d201c\x2dca52\x2d70d5\x2d15ebf02a8c4d.mount: Deactivated successfully. May 17 00:37:32.220474 env[1418]: time="2025-05-17T00:37:32.220431411Z" level=info msg="TearDown network for sandbox \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\" successfully" May 17 00:37:32.220597 env[1418]: time="2025-05-17T00:37:32.220578213Z" level=info msg="StopPodSandbox for \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\" returns successfully" May 17 00:37:32.221650 env[1418]: time="2025-05-17T00:37:32.221622430Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c994b7d8-c8j4r,Uid:cf614254-62a7-4620-98f1-308d50209507,Namespace:calico-apiserver,Attempt:1,}" May 17 00:37:32.227816 env[1418]: 2025-05-17 00:37:32.158 [INFO][3969] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" May 17 00:37:32.227816 env[1418]: 2025-05-17 00:37:32.158 [INFO][3969] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" iface="eth0" netns="/var/run/netns/cni-f619ccf0-9f60-c69e-6e71-ebc835d79773" May 17 00:37:32.227816 env[1418]: 2025-05-17 00:37:32.158 [INFO][3969] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" iface="eth0" netns="/var/run/netns/cni-f619ccf0-9f60-c69e-6e71-ebc835d79773" May 17 00:37:32.227816 env[1418]: 2025-05-17 00:37:32.161 [INFO][3969] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" iface="eth0" netns="/var/run/netns/cni-f619ccf0-9f60-c69e-6e71-ebc835d79773" May 17 00:37:32.227816 env[1418]: 2025-05-17 00:37:32.161 [INFO][3969] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" May 17 00:37:32.227816 env[1418]: 2025-05-17 00:37:32.161 [INFO][3969] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" May 17 00:37:32.227816 env[1418]: 2025-05-17 00:37:32.205 [INFO][3981] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" HandleID="k8s-pod-network.b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0" May 17 00:37:32.227816 env[1418]: 2025-05-17 00:37:32.205 [INFO][3981] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:32.227816 env[1418]: 2025-05-17 00:37:32.211 [INFO][3981] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:32.227816 env[1418]: 2025-05-17 00:37:32.224 [WARNING][3981] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" HandleID="k8s-pod-network.b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0" May 17 00:37:32.227816 env[1418]: 2025-05-17 00:37:32.224 [INFO][3981] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" HandleID="k8s-pod-network.b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0" May 17 00:37:32.227816 env[1418]: 2025-05-17 00:37:32.225 [INFO][3981] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:32.227816 env[1418]: 2025-05-17 00:37:32.226 [INFO][3969] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" May 17 00:37:32.228321 env[1418]: time="2025-05-17T00:37:32.228287737Z" level=info msg="TearDown network for sandbox \"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\" successfully" May 17 00:37:32.228429 env[1418]: time="2025-05-17T00:37:32.228409639Z" level=info msg="StopPodSandbox for \"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\" returns successfully" May 17 00:37:32.229241 env[1418]: time="2025-05-17T00:37:32.229194952Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-95bqg,Uid:93164114-f6fa-4bf2-9171-1b5b8bd0773e,Namespace:kube-system,Attempt:1,}" May 17 00:37:32.233850 systemd[1]: run-netns-cni\x2df619ccf0\x2d9f60\x2dc69e\x2d6e71\x2debc835d79773.mount: Deactivated successfully. May 17 00:37:32.429847 systemd-networkd[1573]: cali8d975e43539: Link UP May 17 00:37:32.442402 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:37:32.442507 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8d975e43539: link becomes ready May 17 00:37:32.443040 systemd-networkd[1573]: cali8d975e43539: Gained carrier May 17 00:37:32.464659 env[1418]: 2025-05-17 00:37:32.331 [INFO][3994] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0 calico-apiserver-5c994b7d8- calico-apiserver cf614254-62a7-4620-98f1-308d50209507 942 0 2025-05-17 00:37:02 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5c994b7d8 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-cef16a74b5 calico-apiserver-5c994b7d8-c8j4r eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali8d975e43539 [] [] }} ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" Namespace="calico-apiserver" Pod="calico-apiserver-5c994b7d8-c8j4r" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-" May 17 00:37:32.464659 env[1418]: 2025-05-17 00:37:32.331 [INFO][3994] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" Namespace="calico-apiserver" Pod="calico-apiserver-5c994b7d8-c8j4r" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:32.464659 env[1418]: 2025-05-17 00:37:32.381 [INFO][4019] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" HandleID="k8s-pod-network.daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:32.464659 env[1418]: 2025-05-17 00:37:32.382 [INFO][4019] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" HandleID="k8s-pod-network.daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1630), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-cef16a74b5", "pod":"calico-apiserver-5c994b7d8-c8j4r", "timestamp":"2025-05-17 00:37:32.381840011 +0000 UTC"}, Hostname:"ci-3510.3.7-n-cef16a74b5", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:37:32.464659 env[1418]: 2025-05-17 00:37:32.382 [INFO][4019] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:32.464659 env[1418]: 2025-05-17 00:37:32.382 [INFO][4019] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:32.464659 env[1418]: 2025-05-17 00:37:32.382 [INFO][4019] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-cef16a74b5' May 17 00:37:32.464659 env[1418]: 2025-05-17 00:37:32.389 [INFO][4019] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:32.464659 env[1418]: 2025-05-17 00:37:32.393 [INFO][4019] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:32.464659 env[1418]: 2025-05-17 00:37:32.397 [INFO][4019] ipam/ipam.go 511: Trying affinity for 192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:32.464659 env[1418]: 2025-05-17 00:37:32.398 [INFO][4019] ipam/ipam.go 158: Attempting to load block cidr=192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:32.464659 env[1418]: 2025-05-17 00:37:32.400 [INFO][4019] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:32.464659 env[1418]: 2025-05-17 00:37:32.400 [INFO][4019] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.34.192/26 handle="k8s-pod-network.daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:32.464659 env[1418]: 2025-05-17 00:37:32.401 [INFO][4019] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28 May 17 00:37:32.464659 env[1418]: 2025-05-17 00:37:32.415 [INFO][4019] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.34.192/26 handle="k8s-pod-network.daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:32.464659 env[1418]: 2025-05-17 00:37:32.420 [INFO][4019] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.34.194/26] block=192.168.34.192/26 handle="k8s-pod-network.daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:32.464659 env[1418]: 2025-05-17 00:37:32.421 [INFO][4019] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.34.194/26] handle="k8s-pod-network.daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:32.464659 env[1418]: 2025-05-17 00:37:32.425 [INFO][4019] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:32.464659 env[1418]: 2025-05-17 00:37:32.425 [INFO][4019] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.194/26] IPv6=[] ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" HandleID="k8s-pod-network.daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:32.465752 env[1418]: 2025-05-17 00:37:32.426 [INFO][3994] cni-plugin/k8s.go 418: Populated endpoint ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" Namespace="calico-apiserver" Pod="calico-apiserver-5c994b7d8-c8j4r" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0", GenerateName:"calico-apiserver-5c994b7d8-", Namespace:"calico-apiserver", SelfLink:"", UID:"cf614254-62a7-4620-98f1-308d50209507", ResourceVersion:"942", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c994b7d8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"", Pod:"calico-apiserver-5c994b7d8-c8j4r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8d975e43539", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:32.465752 env[1418]: 2025-05-17 00:37:32.426 [INFO][3994] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.34.194/32] ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" Namespace="calico-apiserver" Pod="calico-apiserver-5c994b7d8-c8j4r" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:32.465752 env[1418]: 2025-05-17 00:37:32.426 [INFO][3994] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8d975e43539 ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" Namespace="calico-apiserver" Pod="calico-apiserver-5c994b7d8-c8j4r" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:32.465752 env[1418]: 2025-05-17 00:37:32.447 [INFO][3994] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" Namespace="calico-apiserver" Pod="calico-apiserver-5c994b7d8-c8j4r" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:32.465752 env[1418]: 2025-05-17 00:37:32.448 [INFO][3994] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" Namespace="calico-apiserver" Pod="calico-apiserver-5c994b7d8-c8j4r" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0", GenerateName:"calico-apiserver-5c994b7d8-", Namespace:"calico-apiserver", SelfLink:"", UID:"cf614254-62a7-4620-98f1-308d50209507", ResourceVersion:"942", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c994b7d8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28", Pod:"calico-apiserver-5c994b7d8-c8j4r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8d975e43539", MAC:"5e:41:bb:7b:8e:25", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:32.465752 env[1418]: 2025-05-17 00:37:32.463 [INFO][3994] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" Namespace="calico-apiserver" Pod="calico-apiserver-5c994b7d8-c8j4r" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:32.482051 env[1418]: time="2025-05-17T00:37:32.481983224Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:32.482209 env[1418]: time="2025-05-17T00:37:32.482060926Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:32.482209 env[1418]: time="2025-05-17T00:37:32.482089126Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:32.482413 env[1418]: time="2025-05-17T00:37:32.482377131Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28 pid=4048 runtime=io.containerd.runc.v2 May 17 00:37:32.490000 audit[4060]: NETFILTER_CFG table=filter:114 family=2 entries=50 op=nft_register_chain pid=4060 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:32.497133 kernel: kauditd_printk_skb: 623 callbacks suppressed May 17 00:37:32.497218 kernel: audit: type=1325 audit(1747442252.490:1153): table=filter:114 family=2 entries=50 op=nft_register_chain pid=4060 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:32.510360 systemd[1]: Started cri-containerd-daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28.scope. May 17 00:37:32.490000 audit[4060]: SYSCALL arch=c000003e syscall=46 success=yes exit=28208 a0=3 a1=7ffded772510 a2=0 a3=7ffded7724fc items=0 ppid=3764 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:32.533778 kernel: audit: type=1300 audit(1747442252.490:1153): arch=c000003e syscall=46 success=yes exit=28208 a0=3 a1=7ffded772510 a2=0 a3=7ffded7724fc items=0 ppid=3764 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:32.490000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:32.546892 kernel: audit: type=1327 audit(1747442252.490:1153): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:32.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.579487 kernel: audit: type=1400 audit(1747442252.551:1154): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.579580 kernel: audit: type=1400 audit(1747442252.551:1155): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.579610 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6af08eb94f0: link becomes ready May 17 00:37:32.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.571305 systemd-networkd[1573]: cali6af08eb94f0: Link UP May 17 00:37:32.593501 kernel: audit: type=1400 audit(1747442252.551:1156): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.593615 systemd-networkd[1573]: cali6af08eb94f0: Gained carrier May 17 00:37:32.619812 kernel: audit: type=1400 audit(1747442252.551:1157): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.635808 kernel: audit: type=1400 audit(1747442252.551:1158): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.635882 kernel: audit: type=1400 audit(1747442252.551:1159): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.641924 env[1418]: 2025-05-17 00:37:32.349 [INFO][3998] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0 coredns-7c65d6cfc9- kube-system 93164114-f6fa-4bf2-9171-1b5b8bd0773e 941 0 2025-05-17 00:36:52 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-cef16a74b5 coredns-7c65d6cfc9-95bqg eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali6af08eb94f0 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8" Namespace="kube-system" Pod="coredns-7c65d6cfc9-95bqg" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-" May 17 00:37:32.641924 env[1418]: 2025-05-17 00:37:32.349 [INFO][3998] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8" Namespace="kube-system" Pod="coredns-7c65d6cfc9-95bqg" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0" May 17 00:37:32.641924 env[1418]: 2025-05-17 00:37:32.387 [INFO][4025] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8" HandleID="k8s-pod-network.f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0" May 17 00:37:32.641924 env[1418]: 2025-05-17 00:37:32.387 [INFO][4025] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8" HandleID="k8s-pod-network.f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e3020), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-cef16a74b5", "pod":"coredns-7c65d6cfc9-95bqg", "timestamp":"2025-05-17 00:37:32.387478002 +0000 UTC"}, Hostname:"ci-3510.3.7-n-cef16a74b5", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:37:32.641924 env[1418]: 2025-05-17 00:37:32.387 [INFO][4025] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:32.641924 env[1418]: 2025-05-17 00:37:32.421 [INFO][4025] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:32.641924 env[1418]: 2025-05-17 00:37:32.421 [INFO][4025] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-cef16a74b5' May 17 00:37:32.641924 env[1418]: 2025-05-17 00:37:32.493 [INFO][4025] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:32.641924 env[1418]: 2025-05-17 00:37:32.515 [INFO][4025] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:32.641924 env[1418]: 2025-05-17 00:37:32.526 [INFO][4025] ipam/ipam.go 511: Trying affinity for 192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:32.641924 env[1418]: 2025-05-17 00:37:32.528 [INFO][4025] ipam/ipam.go 158: Attempting to load block cidr=192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:32.641924 env[1418]: 2025-05-17 00:37:32.531 [INFO][4025] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:32.641924 env[1418]: 2025-05-17 00:37:32.531 [INFO][4025] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.34.192/26 handle="k8s-pod-network.f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:32.641924 env[1418]: 2025-05-17 00:37:32.535 [INFO][4025] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8 May 17 00:37:32.641924 env[1418]: 2025-05-17 00:37:32.548 [INFO][4025] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.34.192/26 handle="k8s-pod-network.f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:32.641924 env[1418]: 2025-05-17 00:37:32.567 [INFO][4025] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.34.195/26] block=192.168.34.192/26 handle="k8s-pod-network.f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:32.641924 env[1418]: 2025-05-17 00:37:32.567 [INFO][4025] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.34.195/26] handle="k8s-pod-network.f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:32.641924 env[1418]: 2025-05-17 00:37:32.567 [INFO][4025] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:32.641924 env[1418]: 2025-05-17 00:37:32.567 [INFO][4025] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.195/26] IPv6=[] ContainerID="f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8" HandleID="k8s-pod-network.f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0" May 17 00:37:32.642879 env[1418]: 2025-05-17 00:37:32.568 [INFO][3998] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8" Namespace="kube-system" Pod="coredns-7c65d6cfc9-95bqg" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"93164114-f6fa-4bf2-9171-1b5b8bd0773e", ResourceVersion:"941", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"", Pod:"coredns-7c65d6cfc9-95bqg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6af08eb94f0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:32.642879 env[1418]: 2025-05-17 00:37:32.568 [INFO][3998] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.34.195/32] ContainerID="f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8" Namespace="kube-system" Pod="coredns-7c65d6cfc9-95bqg" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0" May 17 00:37:32.642879 env[1418]: 2025-05-17 00:37:32.568 [INFO][3998] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6af08eb94f0 ContainerID="f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8" Namespace="kube-system" Pod="coredns-7c65d6cfc9-95bqg" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0" May 17 00:37:32.642879 env[1418]: 2025-05-17 00:37:32.596 [INFO][3998] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8" Namespace="kube-system" Pod="coredns-7c65d6cfc9-95bqg" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0" May 17 00:37:32.642879 env[1418]: 2025-05-17 00:37:32.596 [INFO][3998] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8" Namespace="kube-system" Pod="coredns-7c65d6cfc9-95bqg" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"93164114-f6fa-4bf2-9171-1b5b8bd0773e", ResourceVersion:"941", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8", Pod:"coredns-7c65d6cfc9-95bqg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6af08eb94f0", MAC:"f6:61:f7:92:ca:12", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:32.642879 env[1418]: 2025-05-17 00:37:32.637 [INFO][3998] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8" Namespace="kube-system" Pod="coredns-7c65d6cfc9-95bqg" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0" May 17 00:37:32.657789 kernel: audit: type=1400 audit(1747442252.551:1160): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.598000 audit: BPF prog-id=163 op=LOAD May 17 00:37:32.598000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.598000 audit[4059]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4048 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:32.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663537316662633838623764363830333461386662346236643930 May 17 00:37:32.598000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.598000 audit[4059]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4048 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:32.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663537316662633838623764363830333461386662346236643930 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit: BPF prog-id=164 op=LOAD May 17 00:37:32.600000 audit[4059]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003aa300 items=0 ppid=4048 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:32.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663537316662633838623764363830333461386662346236643930 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit: BPF prog-id=165 op=LOAD May 17 00:37:32.600000 audit[4059]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0003aa348 items=0 ppid=4048 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:32.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663537316662633838623764363830333461386662346236643930 May 17 00:37:32.600000 audit: BPF prog-id=165 op=UNLOAD May 17 00:37:32.600000 audit: BPF prog-id=164 op=UNLOAD May 17 00:37:32.600000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { perfmon } for pid=4059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit[4059]: AVC avc: denied { bpf } for pid=4059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.600000 audit: BPF prog-id=166 op=LOAD May 17 00:37:32.600000 audit[4059]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003aa758 items=0 ppid=4048 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:32.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461663537316662633838623764363830333461386662346236643930 May 17 00:37:32.668991 env[1418]: time="2025-05-17T00:37:32.668925536Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:32.669109 env[1418]: time="2025-05-17T00:37:32.669009537Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:32.669109 env[1418]: time="2025-05-17T00:37:32.669038938Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:32.669308 env[1418]: time="2025-05-17T00:37:32.669205541Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8 pid=4092 runtime=io.containerd.runc.v2 May 17 00:37:32.704851 env[1418]: time="2025-05-17T00:37:32.697277093Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c994b7d8-c8j4r,Uid:cf614254-62a7-4620-98f1-308d50209507,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28\"" May 17 00:37:32.675000 audit[4099]: NETFILTER_CFG table=filter:115 family=2 entries=46 op=nft_register_chain pid=4099 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:32.707248 systemd[1]: Started cri-containerd-f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8.scope. May 17 00:37:32.675000 audit[4099]: SYSCALL arch=c000003e syscall=46 success=yes exit=23740 a0=3 a1=7ffe3c11bd00 a2=0 a3=7ffe3c11bcec items=0 ppid=3764 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:32.675000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:32.715128 env[1418]: time="2025-05-17T00:37:32.715061379Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:37:32.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit: BPF prog-id=167 op=LOAD May 17 00:37:32.726000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit[4103]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4092 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:32.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631623034653037333064373238643133376338363464353263366134 May 17 00:37:32.726000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit[4103]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4092 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:32.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631623034653037333064373238643133376338363464353263366134 May 17 00:37:32.726000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit: BPF prog-id=168 op=LOAD May 17 00:37:32.726000 audit[4103]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000309390 items=0 ppid=4092 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:32.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631623034653037333064373238643133376338363464353263366134 May 17 00:37:32.726000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.726000 audit: BPF prog-id=169 op=LOAD May 17 00:37:32.726000 audit[4103]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003093d8 items=0 ppid=4092 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:32.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631623034653037333064373238643133376338363464353263366134 May 17 00:37:32.726000 audit: BPF prog-id=169 op=UNLOAD May 17 00:37:32.727000 audit: BPF prog-id=168 op=UNLOAD May 17 00:37:32.727000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.727000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.727000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.727000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.727000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.727000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.727000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.727000 audit[4103]: AVC avc: denied { perfmon } for pid=4103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.727000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.727000 audit[4103]: AVC avc: denied { bpf } for pid=4103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.727000 audit: BPF prog-id=170 op=LOAD May 17 00:37:32.727000 audit[4103]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003097e8 items=0 ppid=4092 pid=4103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:32.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631623034653037333064373238643133376338363464353263366134 May 17 00:37:32.757210 env[1418]: time="2025-05-17T00:37:32.757162858Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-95bqg,Uid:93164114-f6fa-4bf2-9171-1b5b8bd0773e,Namespace:kube-system,Attempt:1,} returns sandbox id \"f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8\"" May 17 00:37:32.760434 env[1418]: time="2025-05-17T00:37:32.760387610Z" level=info msg="CreateContainer within sandbox \"f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:37:32.800065 env[1418]: time="2025-05-17T00:37:32.800021848Z" level=info msg="CreateContainer within sandbox \"f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"1377b9ffaf6b864e02c6cbc3cb8fdad84fa41069d96c45f20b573abc40bea152\"" May 17 00:37:32.800839 env[1418]: time="2025-05-17T00:37:32.800805861Z" level=info msg="StartContainer for \"1377b9ffaf6b864e02c6cbc3cb8fdad84fa41069d96c45f20b573abc40bea152\"" May 17 00:37:32.818792 systemd[1]: Started cri-containerd-1377b9ffaf6b864e02c6cbc3cb8fdad84fa41069d96c45f20b573abc40bea152.scope. May 17 00:37:32.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.832000 audit: BPF prog-id=171 op=LOAD May 17 00:37:32.832000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.832000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4092 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:32.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133373762396666616636623836346530326336636263336362386664 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4092 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:32.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133373762396666616636623836346530326336636263336362386664 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit: BPF prog-id=172 op=LOAD May 17 00:37:32.833000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000af730 items=0 ppid=4092 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:32.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133373762396666616636623836346530326336636263336362386664 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit: BPF prog-id=173 op=LOAD May 17 00:37:32.833000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000af778 items=0 ppid=4092 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:32.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133373762396666616636623836346530326336636263336362386664 May 17 00:37:32.833000 audit: BPF prog-id=173 op=UNLOAD May 17 00:37:32.833000 audit: BPF prog-id=172 op=UNLOAD May 17 00:37:32.833000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:32.833000 audit: BPF prog-id=174 op=LOAD May 17 00:37:32.833000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000afb88 items=0 ppid=4092 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:32.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133373762396666616636623836346530326336636263336362386664 May 17 00:37:32.857402 env[1418]: time="2025-05-17T00:37:32.857348172Z" level=info msg="StartContainer for \"1377b9ffaf6b864e02c6cbc3cb8fdad84fa41069d96c45f20b573abc40bea152\" returns successfully" May 17 00:37:32.859000 audit[4152]: AVC avc: denied { getattr } for pid=4152 comm="coredns" path="cgroup:[4026532731]" dev="nsfs" ino=4026532731 scontext=system_u:system_r:svirt_lxc_net_t:s0:c664,c972 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:37:32.859000 audit[4152]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a900 a2=c000438e08 a3=0 items=0 ppid=4092 pid=4152 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c664,c972 key=(null) May 17 00:37:32.859000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:37:33.087081 env[1418]: time="2025-05-17T00:37:33.087012249Z" level=info msg="StopPodSandbox for \"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\"" May 17 00:37:33.087587 env[1418]: time="2025-05-17T00:37:33.087540457Z" level=info msg="StopPodSandbox for \"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\"" May 17 00:37:33.237513 env[1418]: 2025-05-17 00:37:33.178 [INFO][4187] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" May 17 00:37:33.237513 env[1418]: 2025-05-17 00:37:33.178 [INFO][4187] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" iface="eth0" netns="/var/run/netns/cni-f7dfa5a5-d52e-c23e-8285-a7d5e2c0781c" May 17 00:37:33.237513 env[1418]: 2025-05-17 00:37:33.178 [INFO][4187] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" iface="eth0" netns="/var/run/netns/cni-f7dfa5a5-d52e-c23e-8285-a7d5e2c0781c" May 17 00:37:33.237513 env[1418]: 2025-05-17 00:37:33.179 [INFO][4187] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" iface="eth0" netns="/var/run/netns/cni-f7dfa5a5-d52e-c23e-8285-a7d5e2c0781c" May 17 00:37:33.237513 env[1418]: 2025-05-17 00:37:33.179 [INFO][4187] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" May 17 00:37:33.237513 env[1418]: 2025-05-17 00:37:33.179 [INFO][4187] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" May 17 00:37:33.237513 env[1418]: 2025-05-17 00:37:33.214 [INFO][4203] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" HandleID="k8s-pod-network.f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0" May 17 00:37:33.237513 env[1418]: 2025-05-17 00:37:33.215 [INFO][4203] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:33.237513 env[1418]: 2025-05-17 00:37:33.215 [INFO][4203] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:33.237513 env[1418]: 2025-05-17 00:37:33.232 [WARNING][4203] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" HandleID="k8s-pod-network.f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0" May 17 00:37:33.237513 env[1418]: 2025-05-17 00:37:33.232 [INFO][4203] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" HandleID="k8s-pod-network.f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0" May 17 00:37:33.237513 env[1418]: 2025-05-17 00:37:33.234 [INFO][4203] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:33.237513 env[1418]: 2025-05-17 00:37:33.236 [INFO][4187] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" May 17 00:37:33.242077 systemd[1]: run-netns-cni\x2df7dfa5a5\x2dd52e\x2dc23e\x2d8285\x2da7d5e2c0781c.mount: Deactivated successfully. May 17 00:37:33.242591 env[1418]: time="2025-05-17T00:37:33.242540812Z" level=info msg="TearDown network for sandbox \"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\" successfully" May 17 00:37:33.242708 env[1418]: time="2025-05-17T00:37:33.242688615Z" level=info msg="StopPodSandbox for \"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\" returns successfully" May 17 00:37:33.243697 env[1418]: time="2025-05-17T00:37:33.243664730Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bd946bb48-2lg62,Uid:c05e338a-4f12-40a1-8a27-51112ea43071,Namespace:calico-apiserver,Attempt:1,}" May 17 00:37:33.265482 env[1418]: 2025-05-17 00:37:33.198 [INFO][4191] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" May 17 00:37:33.265482 env[1418]: 2025-05-17 00:37:33.198 [INFO][4191] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" iface="eth0" netns="/var/run/netns/cni-7d3fa1f9-8fba-2153-43c3-e3a7b6d1a38c" May 17 00:37:33.265482 env[1418]: 2025-05-17 00:37:33.198 [INFO][4191] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" iface="eth0" netns="/var/run/netns/cni-7d3fa1f9-8fba-2153-43c3-e3a7b6d1a38c" May 17 00:37:33.265482 env[1418]: 2025-05-17 00:37:33.198 [INFO][4191] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" iface="eth0" netns="/var/run/netns/cni-7d3fa1f9-8fba-2153-43c3-e3a7b6d1a38c" May 17 00:37:33.265482 env[1418]: 2025-05-17 00:37:33.198 [INFO][4191] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" May 17 00:37:33.265482 env[1418]: 2025-05-17 00:37:33.198 [INFO][4191] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" May 17 00:37:33.265482 env[1418]: 2025-05-17 00:37:33.251 [INFO][4209] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" HandleID="k8s-pod-network.331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0" May 17 00:37:33.265482 env[1418]: 2025-05-17 00:37:33.251 [INFO][4209] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:33.265482 env[1418]: 2025-05-17 00:37:33.254 [INFO][4209] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:33.265482 env[1418]: 2025-05-17 00:37:33.260 [WARNING][4209] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" HandleID="k8s-pod-network.331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0" May 17 00:37:33.265482 env[1418]: 2025-05-17 00:37:33.261 [INFO][4209] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" HandleID="k8s-pod-network.331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0" May 17 00:37:33.265482 env[1418]: 2025-05-17 00:37:33.263 [INFO][4209] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:33.265482 env[1418]: 2025-05-17 00:37:33.264 [INFO][4191] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" May 17 00:37:33.269034 systemd[1]: run-netns-cni\x2d7d3fa1f9\x2d8fba\x2d2153\x2d43c3\x2de3a7b6d1a38c.mount: Deactivated successfully. May 17 00:37:33.270571 env[1418]: time="2025-05-17T00:37:33.270526856Z" level=info msg="TearDown network for sandbox \"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\" successfully" May 17 00:37:33.270665 env[1418]: time="2025-05-17T00:37:33.270569256Z" level=info msg="StopPodSandbox for \"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\" returns successfully" May 17 00:37:33.271344 env[1418]: time="2025-05-17T00:37:33.271312868Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85557d7668-6rdqn,Uid:347bafb1-edcc-4760-a4b8-54009b8f96fa,Namespace:calico-system,Attempt:1,}" May 17 00:37:33.372868 kubelet[2411]: I0517 00:37:33.372714 2411 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-95bqg" podStartSLOduration=41.372689874 podStartE2EDuration="41.372689874s" podCreationTimestamp="2025-05-17 00:36:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:37:33.345690646 +0000 UTC m=+47.997636456" watchObservedRunningTime="2025-05-17 00:37:33.372689874 +0000 UTC m=+48.024635684" May 17 00:37:33.375000 audit[4229]: NETFILTER_CFG table=filter:116 family=2 entries=20 op=nft_register_rule pid=4229 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:33.375000 audit[4229]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fffa6a34fb0 a2=0 a3=7fffa6a34f9c items=0 ppid=2515 pid=4229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.375000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:33.380000 audit[4229]: NETFILTER_CFG table=nat:117 family=2 entries=14 op=nft_register_rule pid=4229 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:33.380000 audit[4229]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffa6a34fb0 a2=0 a3=0 items=0 ppid=2515 pid=4229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.380000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:33.411000 audit[4241]: NETFILTER_CFG table=filter:118 family=2 entries=17 op=nft_register_rule pid=4241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:33.411000 audit[4241]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd58861120 a2=0 a3=7ffd5886110c items=0 ppid=2515 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.411000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:33.417000 audit[4241]: NETFILTER_CFG table=nat:119 family=2 entries=35 op=nft_register_chain pid=4241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:33.417000 audit[4241]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd58861120 a2=0 a3=7ffd5886110c items=0 ppid=2515 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.417000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:33.512377 systemd-networkd[1573]: cali1bdb5a298da: Link UP May 17 00:37:33.523174 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:37:33.523274 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1bdb5a298da: link becomes ready May 17 00:37:33.524189 systemd-networkd[1573]: cali1bdb5a298da: Gained carrier May 17 00:37:33.545348 env[1418]: 2025-05-17 00:37:33.395 [INFO][4217] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0 calico-apiserver-7bd946bb48- calico-apiserver c05e338a-4f12-40a1-8a27-51112ea43071 956 0 2025-05-17 00:37:03 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7bd946bb48 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-cef16a74b5 calico-apiserver-7bd946bb48-2lg62 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali1bdb5a298da [] [] }} ContainerID="43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828" Namespace="calico-apiserver" Pod="calico-apiserver-7bd946bb48-2lg62" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-" May 17 00:37:33.545348 env[1418]: 2025-05-17 00:37:33.395 [INFO][4217] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828" Namespace="calico-apiserver" Pod="calico-apiserver-7bd946bb48-2lg62" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0" May 17 00:37:33.545348 env[1418]: 2025-05-17 00:37:33.456 [INFO][4242] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828" HandleID="k8s-pod-network.43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0" May 17 00:37:33.545348 env[1418]: 2025-05-17 00:37:33.456 [INFO][4242] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828" HandleID="k8s-pod-network.43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1630), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-cef16a74b5", "pod":"calico-apiserver-7bd946bb48-2lg62", "timestamp":"2025-05-17 00:37:33.456517902 +0000 UTC"}, Hostname:"ci-3510.3.7-n-cef16a74b5", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:37:33.545348 env[1418]: 2025-05-17 00:37:33.456 [INFO][4242] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:33.545348 env[1418]: 2025-05-17 00:37:33.457 [INFO][4242] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:33.545348 env[1418]: 2025-05-17 00:37:33.457 [INFO][4242] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-cef16a74b5' May 17 00:37:33.545348 env[1418]: 2025-05-17 00:37:33.471 [INFO][4242] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:33.545348 env[1418]: 2025-05-17 00:37:33.478 [INFO][4242] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:33.545348 env[1418]: 2025-05-17 00:37:33.484 [INFO][4242] ipam/ipam.go 511: Trying affinity for 192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:33.545348 env[1418]: 2025-05-17 00:37:33.486 [INFO][4242] ipam/ipam.go 158: Attempting to load block cidr=192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:33.545348 env[1418]: 2025-05-17 00:37:33.488 [INFO][4242] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:33.545348 env[1418]: 2025-05-17 00:37:33.488 [INFO][4242] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.34.192/26 handle="k8s-pod-network.43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:33.545348 env[1418]: 2025-05-17 00:37:33.489 [INFO][4242] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828 May 17 00:37:33.545348 env[1418]: 2025-05-17 00:37:33.495 [INFO][4242] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.34.192/26 handle="k8s-pod-network.43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:33.545348 env[1418]: 2025-05-17 00:37:33.506 [INFO][4242] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.34.196/26] block=192.168.34.192/26 handle="k8s-pod-network.43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:33.545348 env[1418]: 2025-05-17 00:37:33.506 [INFO][4242] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.34.196/26] handle="k8s-pod-network.43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:33.545348 env[1418]: 2025-05-17 00:37:33.506 [INFO][4242] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:33.545348 env[1418]: 2025-05-17 00:37:33.506 [INFO][4242] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.196/26] IPv6=[] ContainerID="43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828" HandleID="k8s-pod-network.43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0" May 17 00:37:33.546261 env[1418]: 2025-05-17 00:37:33.508 [INFO][4217] cni-plugin/k8s.go 418: Populated endpoint ContainerID="43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828" Namespace="calico-apiserver" Pod="calico-apiserver-7bd946bb48-2lg62" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0", GenerateName:"calico-apiserver-7bd946bb48-", Namespace:"calico-apiserver", SelfLink:"", UID:"c05e338a-4f12-40a1-8a27-51112ea43071", ResourceVersion:"956", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bd946bb48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"", Pod:"calico-apiserver-7bd946bb48-2lg62", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1bdb5a298da", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:33.546261 env[1418]: 2025-05-17 00:37:33.508 [INFO][4217] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.34.196/32] ContainerID="43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828" Namespace="calico-apiserver" Pod="calico-apiserver-7bd946bb48-2lg62" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0" May 17 00:37:33.546261 env[1418]: 2025-05-17 00:37:33.508 [INFO][4217] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1bdb5a298da ContainerID="43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828" Namespace="calico-apiserver" Pod="calico-apiserver-7bd946bb48-2lg62" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0" May 17 00:37:33.546261 env[1418]: 2025-05-17 00:37:33.524 [INFO][4217] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828" Namespace="calico-apiserver" Pod="calico-apiserver-7bd946bb48-2lg62" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0" May 17 00:37:33.546261 env[1418]: 2025-05-17 00:37:33.525 [INFO][4217] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828" Namespace="calico-apiserver" Pod="calico-apiserver-7bd946bb48-2lg62" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0", GenerateName:"calico-apiserver-7bd946bb48-", Namespace:"calico-apiserver", SelfLink:"", UID:"c05e338a-4f12-40a1-8a27-51112ea43071", ResourceVersion:"956", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bd946bb48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828", Pod:"calico-apiserver-7bd946bb48-2lg62", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1bdb5a298da", MAC:"e6:4d:94:08:59:bd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:33.546261 env[1418]: 2025-05-17 00:37:33.542 [INFO][4217] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828" Namespace="calico-apiserver" Pod="calico-apiserver-7bd946bb48-2lg62" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0" May 17 00:37:33.562000 audit[4266]: NETFILTER_CFG table=filter:120 family=2 entries=45 op=nft_register_chain pid=4266 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:33.562000 audit[4266]: SYSCALL arch=c000003e syscall=46 success=yes exit=24264 a0=3 a1=7fff27f129f0 a2=0 a3=7fff27f129dc items=0 ppid=3764 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.562000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:33.601354 env[1418]: time="2025-05-17T00:37:33.601268795Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:33.601354 env[1418]: time="2025-05-17T00:37:33.601317096Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:33.601354 env[1418]: time="2025-05-17T00:37:33.601331096Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:33.601730 env[1418]: time="2025-05-17T00:37:33.601686901Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828 pid=4274 runtime=io.containerd.runc.v2 May 17 00:37:33.616082 systemd-networkd[1573]: calib006699f912: Link UP May 17 00:37:33.622855 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib006699f912: link becomes ready May 17 00:37:33.623862 systemd-networkd[1573]: calib006699f912: Gained carrier May 17 00:37:33.647804 systemd[1]: Started cri-containerd-43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828.scope. May 17 00:37:33.656482 env[1418]: 2025-05-17 00:37:33.474 [INFO][4230] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0 calico-kube-controllers-85557d7668- calico-system 347bafb1-edcc-4760-a4b8-54009b8f96fa 957 0 2025-05-17 00:37:07 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:85557d7668 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.7-n-cef16a74b5 calico-kube-controllers-85557d7668-6rdqn eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calib006699f912 [] [] }} ContainerID="bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17" Namespace="calico-system" Pod="calico-kube-controllers-85557d7668-6rdqn" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-" May 17 00:37:33.656482 env[1418]: 2025-05-17 00:37:33.474 [INFO][4230] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17" Namespace="calico-system" Pod="calico-kube-controllers-85557d7668-6rdqn" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0" May 17 00:37:33.656482 env[1418]: 2025-05-17 00:37:33.562 [INFO][4252] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17" HandleID="k8s-pod-network.bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0" May 17 00:37:33.656482 env[1418]: 2025-05-17 00:37:33.562 [INFO][4252] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17" HandleID="k8s-pod-network.bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9980), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-cef16a74b5", "pod":"calico-kube-controllers-85557d7668-6rdqn", "timestamp":"2025-05-17 00:37:33.562770485 +0000 UTC"}, Hostname:"ci-3510.3.7-n-cef16a74b5", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:37:33.656482 env[1418]: 2025-05-17 00:37:33.563 [INFO][4252] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:33.656482 env[1418]: 2025-05-17 00:37:33.563 [INFO][4252] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:33.656482 env[1418]: 2025-05-17 00:37:33.563 [INFO][4252] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-cef16a74b5' May 17 00:37:33.656482 env[1418]: 2025-05-17 00:37:33.579 [INFO][4252] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:33.656482 env[1418]: 2025-05-17 00:37:33.584 [INFO][4252] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:33.656482 env[1418]: 2025-05-17 00:37:33.588 [INFO][4252] ipam/ipam.go 511: Trying affinity for 192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:33.656482 env[1418]: 2025-05-17 00:37:33.589 [INFO][4252] ipam/ipam.go 158: Attempting to load block cidr=192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:33.656482 env[1418]: 2025-05-17 00:37:33.591 [INFO][4252] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:33.656482 env[1418]: 2025-05-17 00:37:33.591 [INFO][4252] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.34.192/26 handle="k8s-pod-network.bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:33.656482 env[1418]: 2025-05-17 00:37:33.592 [INFO][4252] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17 May 17 00:37:33.656482 env[1418]: 2025-05-17 00:37:33.598 [INFO][4252] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.34.192/26 handle="k8s-pod-network.bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:33.656482 env[1418]: 2025-05-17 00:37:33.608 [INFO][4252] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.34.197/26] block=192.168.34.192/26 handle="k8s-pod-network.bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:33.656482 env[1418]: 2025-05-17 00:37:33.609 [INFO][4252] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.34.197/26] handle="k8s-pod-network.bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:33.656482 env[1418]: 2025-05-17 00:37:33.609 [INFO][4252] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:33.656482 env[1418]: 2025-05-17 00:37:33.609 [INFO][4252] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.197/26] IPv6=[] ContainerID="bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17" HandleID="k8s-pod-network.bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0" May 17 00:37:33.657498 env[1418]: 2025-05-17 00:37:33.610 [INFO][4230] cni-plugin/k8s.go 418: Populated endpoint ContainerID="bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17" Namespace="calico-system" Pod="calico-kube-controllers-85557d7668-6rdqn" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0", GenerateName:"calico-kube-controllers-85557d7668-", Namespace:"calico-system", SelfLink:"", UID:"347bafb1-edcc-4760-a4b8-54009b8f96fa", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85557d7668", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"", Pod:"calico-kube-controllers-85557d7668-6rdqn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.34.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib006699f912", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:33.657498 env[1418]: 2025-05-17 00:37:33.610 [INFO][4230] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.34.197/32] ContainerID="bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17" Namespace="calico-system" Pod="calico-kube-controllers-85557d7668-6rdqn" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0" May 17 00:37:33.657498 env[1418]: 2025-05-17 00:37:33.611 [INFO][4230] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib006699f912 ContainerID="bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17" Namespace="calico-system" Pod="calico-kube-controllers-85557d7668-6rdqn" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0" May 17 00:37:33.657498 env[1418]: 2025-05-17 00:37:33.628 [INFO][4230] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17" Namespace="calico-system" Pod="calico-kube-controllers-85557d7668-6rdqn" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0" May 17 00:37:33.657498 env[1418]: 2025-05-17 00:37:33.630 [INFO][4230] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17" Namespace="calico-system" Pod="calico-kube-controllers-85557d7668-6rdqn" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0", GenerateName:"calico-kube-controllers-85557d7668-", Namespace:"calico-system", SelfLink:"", UID:"347bafb1-edcc-4760-a4b8-54009b8f96fa", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85557d7668", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17", Pod:"calico-kube-controllers-85557d7668-6rdqn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.34.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib006699f912", MAC:"4e:61:e1:96:9a:63", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:33.657498 env[1418]: 2025-05-17 00:37:33.651 [INFO][4230] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17" Namespace="calico-system" Pod="calico-kube-controllers-85557d7668-6rdqn" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0" May 17 00:37:33.679753 env[1418]: time="2025-05-17T00:37:33.679672637Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:33.679753 env[1418]: time="2025-05-17T00:37:33.679754638Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:33.679976 env[1418]: time="2025-05-17T00:37:33.679791539Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:33.679976 env[1418]: time="2025-05-17T00:37:33.679937641Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17 pid=4319 runtime=io.containerd.runc.v2 May 17 00:37:33.678000 audit[4310]: NETFILTER_CFG table=filter:121 family=2 entries=48 op=nft_register_chain pid=4310 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:33.678000 audit[4310]: SYSCALL arch=c000003e syscall=46 success=yes exit=23140 a0=3 a1=7ffd9e7b3640 a2=0 a3=7ffd9e7b362c items=0 ppid=3764 pid=4310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.678000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:33.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.688000 audit: BPF prog-id=175 op=LOAD May 17 00:37:33.689000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.689000 audit[4284]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=4274 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433313938633461383830306138313130383861393236613766633536 May 17 00:37:33.690000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.690000 audit[4284]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=4274 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433313938633461383830306138313130383861393236613766633536 May 17 00:37:33.690000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.690000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.690000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.690000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.690000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.690000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.690000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.690000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.690000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.690000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.690000 audit: BPF prog-id=176 op=LOAD May 17 00:37:33.690000 audit[4284]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000024530 items=0 ppid=4274 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433313938633461383830306138313130383861393236613766633536 May 17 00:37:33.691000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.691000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.691000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.691000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.691000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.691000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.691000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.691000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.691000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.691000 audit: BPF prog-id=177 op=LOAD May 17 00:37:33.691000 audit[4284]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000024578 items=0 ppid=4274 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433313938633461383830306138313130383861393236613766633536 May 17 00:37:33.691000 audit: BPF prog-id=177 op=UNLOAD May 17 00:37:33.691000 audit: BPF prog-id=176 op=UNLOAD May 17 00:37:33.691000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.691000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.691000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.691000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.691000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.691000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.691000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.691000 audit[4284]: AVC avc: denied { perfmon } for pid=4284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.691000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.691000 audit[4284]: AVC avc: denied { bpf } for pid=4284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.691000 audit: BPF prog-id=178 op=LOAD May 17 00:37:33.691000 audit[4284]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c000024988 items=0 ppid=4274 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433313938633461383830306138313130383861393236613766633536 May 17 00:37:33.701030 systemd[1]: Started cri-containerd-bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17.scope. May 17 00:37:33.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.719000 audit: BPF prog-id=179 op=LOAD May 17 00:37:33.720000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4319 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264333830303166336332663434326164613038333363373564323238 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4319 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264333830303166336332663434326164613038333363373564323238 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit: BPF prog-id=180 op=LOAD May 17 00:37:33.720000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003f20b0 items=0 ppid=4319 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264333830303166336332663434326164613038333363373564323238 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit: BPF prog-id=181 op=LOAD May 17 00:37:33.720000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003f20f8 items=0 ppid=4319 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264333830303166336332663434326164613038333363373564323238 May 17 00:37:33.720000 audit: BPF prog-id=181 op=UNLOAD May 17 00:37:33.720000 audit: BPF prog-id=180 op=UNLOAD May 17 00:37:33.720000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { perfmon } for pid=4328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit[4328]: AVC avc: denied { bpf } for pid=4328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.720000 audit: BPF prog-id=182 op=LOAD May 17 00:37:33.720000 audit[4328]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003f2508 items=0 ppid=4319 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264333830303166336332663434326164613038333363373564323238 May 17 00:37:33.771038 env[1418]: time="2025-05-17T00:37:33.770985683Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bd946bb48-2lg62,Uid:c05e338a-4f12-40a1-8a27-51112ea43071,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828\"" May 17 00:37:33.785905 env[1418]: time="2025-05-17T00:37:33.785858519Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85557d7668-6rdqn,Uid:347bafb1-edcc-4760-a4b8-54009b8f96fa,Namespace:calico-system,Attempt:1,} returns sandbox id \"bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17\"" May 17 00:37:33.900985 systemd-networkd[1573]: cali6af08eb94f0: Gained IPv6LL May 17 00:37:34.087376 env[1418]: time="2025-05-17T00:37:34.086087953Z" level=info msg="StopPodSandbox for \"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\"" May 17 00:37:34.087971 env[1418]: time="2025-05-17T00:37:34.087928681Z" level=info msg="StopPodSandbox for \"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\"" May 17 00:37:34.210351 env[1418]: 2025-05-17 00:37:34.154 [INFO][4381] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" May 17 00:37:34.210351 env[1418]: 2025-05-17 00:37:34.155 [INFO][4381] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" iface="eth0" netns="/var/run/netns/cni-269bcf19-28f4-7dd2-dcef-ace43b47ee9e" May 17 00:37:34.210351 env[1418]: 2025-05-17 00:37:34.155 [INFO][4381] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" iface="eth0" netns="/var/run/netns/cni-269bcf19-28f4-7dd2-dcef-ace43b47ee9e" May 17 00:37:34.210351 env[1418]: 2025-05-17 00:37:34.155 [INFO][4381] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" iface="eth0" netns="/var/run/netns/cni-269bcf19-28f4-7dd2-dcef-ace43b47ee9e" May 17 00:37:34.210351 env[1418]: 2025-05-17 00:37:34.155 [INFO][4381] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" May 17 00:37:34.210351 env[1418]: 2025-05-17 00:37:34.155 [INFO][4381] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" May 17 00:37:34.210351 env[1418]: 2025-05-17 00:37:34.192 [INFO][4394] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" HandleID="k8s-pod-network.30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0" May 17 00:37:34.210351 env[1418]: 2025-05-17 00:37:34.192 [INFO][4394] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:34.210351 env[1418]: 2025-05-17 00:37:34.192 [INFO][4394] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:34.210351 env[1418]: 2025-05-17 00:37:34.199 [WARNING][4394] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" HandleID="k8s-pod-network.30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0" May 17 00:37:34.210351 env[1418]: 2025-05-17 00:37:34.199 [INFO][4394] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" HandleID="k8s-pod-network.30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0" May 17 00:37:34.210351 env[1418]: 2025-05-17 00:37:34.207 [INFO][4394] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:34.210351 env[1418]: 2025-05-17 00:37:34.208 [INFO][4381] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" May 17 00:37:34.211427 env[1418]: time="2025-05-17T00:37:34.211380605Z" level=info msg="TearDown network for sandbox \"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\" successfully" May 17 00:37:34.211532 env[1418]: time="2025-05-17T00:37:34.211513107Z" level=info msg="StopPodSandbox for \"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\" returns successfully" May 17 00:37:34.212911 env[1418]: time="2025-05-17T00:37:34.212868228Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-762rf,Uid:6f5898dd-362a-45eb-be33-c0265577ee40,Namespace:kube-system,Attempt:1,}" May 17 00:37:34.224726 systemd[1]: run-netns-cni\x2d269bcf19\x2d28f4\x2d7dd2\x2ddcef\x2dace43b47ee9e.mount: Deactivated successfully. May 17 00:37:34.229189 env[1418]: 2025-05-17 00:37:34.159 [INFO][4382] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" May 17 00:37:34.229189 env[1418]: 2025-05-17 00:37:34.159 [INFO][4382] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" iface="eth0" netns="/var/run/netns/cni-c182c648-b3aa-8375-e792-baacf1384a7b" May 17 00:37:34.229189 env[1418]: 2025-05-17 00:37:34.160 [INFO][4382] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" iface="eth0" netns="/var/run/netns/cni-c182c648-b3aa-8375-e792-baacf1384a7b" May 17 00:37:34.229189 env[1418]: 2025-05-17 00:37:34.162 [INFO][4382] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" iface="eth0" netns="/var/run/netns/cni-c182c648-b3aa-8375-e792-baacf1384a7b" May 17 00:37:34.229189 env[1418]: 2025-05-17 00:37:34.163 [INFO][4382] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" May 17 00:37:34.229189 env[1418]: 2025-05-17 00:37:34.163 [INFO][4382] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" May 17 00:37:34.229189 env[1418]: 2025-05-17 00:37:34.206 [INFO][4396] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" HandleID="k8s-pod-network.8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" Workload="ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0" May 17 00:37:34.229189 env[1418]: 2025-05-17 00:37:34.206 [INFO][4396] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:34.229189 env[1418]: 2025-05-17 00:37:34.207 [INFO][4396] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:34.229189 env[1418]: 2025-05-17 00:37:34.214 [WARNING][4396] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" HandleID="k8s-pod-network.8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" Workload="ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0" May 17 00:37:34.229189 env[1418]: 2025-05-17 00:37:34.214 [INFO][4396] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" HandleID="k8s-pod-network.8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" Workload="ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0" May 17 00:37:34.229189 env[1418]: 2025-05-17 00:37:34.216 [INFO][4396] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:34.229189 env[1418]: 2025-05-17 00:37:34.225 [INFO][4382] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" May 17 00:37:34.230538 env[1418]: time="2025-05-17T00:37:34.230489802Z" level=info msg="TearDown network for sandbox \"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\" successfully" May 17 00:37:34.230664 env[1418]: time="2025-05-17T00:37:34.230641805Z" level=info msg="StopPodSandbox for \"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\" returns successfully" May 17 00:37:34.234118 env[1418]: time="2025-05-17T00:37:34.233077243Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-shhph,Uid:6c0070f8-dd11-4a02-a60b-d807c5fc3160,Namespace:calico-system,Attempt:1,}" May 17 00:37:34.233677 systemd[1]: run-netns-cni\x2dc182c648\x2db3aa\x2d8375\x2de792\x2dbaacf1384a7b.mount: Deactivated successfully. May 17 00:37:34.487398 systemd-networkd[1573]: cali8d975e43539: Gained IPv6LL May 17 00:37:34.672800 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:37:34.673528 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie5f703aa071: link becomes ready May 17 00:37:34.664789 systemd-networkd[1573]: calie5f703aa071: Link UP May 17 00:37:34.678530 systemd-networkd[1573]: calie5f703aa071: Gained carrier May 17 00:37:34.716180 env[1418]: 2025-05-17 00:37:34.500 [INFO][4407] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0 coredns-7c65d6cfc9- kube-system 6f5898dd-362a-45eb-be33-c0265577ee40 980 0 2025-05-17 00:36:52 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-cef16a74b5 coredns-7c65d6cfc9-762rf eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie5f703aa071 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e" Namespace="kube-system" Pod="coredns-7c65d6cfc9-762rf" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-" May 17 00:37:34.716180 env[1418]: 2025-05-17 00:37:34.500 [INFO][4407] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e" Namespace="kube-system" Pod="coredns-7c65d6cfc9-762rf" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0" May 17 00:37:34.716180 env[1418]: 2025-05-17 00:37:34.583 [INFO][4432] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e" HandleID="k8s-pod-network.6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0" May 17 00:37:34.716180 env[1418]: 2025-05-17 00:37:34.583 [INFO][4432] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e" HandleID="k8s-pod-network.6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00032a140), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-cef16a74b5", "pod":"coredns-7c65d6cfc9-762rf", "timestamp":"2025-05-17 00:37:34.583118396 +0000 UTC"}, Hostname:"ci-3510.3.7-n-cef16a74b5", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:37:34.716180 env[1418]: 2025-05-17 00:37:34.584 [INFO][4432] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:34.716180 env[1418]: 2025-05-17 00:37:34.584 [INFO][4432] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:34.716180 env[1418]: 2025-05-17 00:37:34.584 [INFO][4432] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-cef16a74b5' May 17 00:37:34.716180 env[1418]: 2025-05-17 00:37:34.591 [INFO][4432] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:34.716180 env[1418]: 2025-05-17 00:37:34.603 [INFO][4432] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:34.716180 env[1418]: 2025-05-17 00:37:34.617 [INFO][4432] ipam/ipam.go 511: Trying affinity for 192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:34.716180 env[1418]: 2025-05-17 00:37:34.619 [INFO][4432] ipam/ipam.go 158: Attempting to load block cidr=192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:34.716180 env[1418]: 2025-05-17 00:37:34.630 [INFO][4432] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:34.716180 env[1418]: 2025-05-17 00:37:34.630 [INFO][4432] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.34.192/26 handle="k8s-pod-network.6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:34.716180 env[1418]: 2025-05-17 00:37:34.635 [INFO][4432] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e May 17 00:37:34.716180 env[1418]: 2025-05-17 00:37:34.641 [INFO][4432] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.34.192/26 handle="k8s-pod-network.6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:34.716180 env[1418]: 2025-05-17 00:37:34.652 [INFO][4432] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.34.198/26] block=192.168.34.192/26 handle="k8s-pod-network.6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:34.716180 env[1418]: 2025-05-17 00:37:34.652 [INFO][4432] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.34.198/26] handle="k8s-pod-network.6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:34.716180 env[1418]: 2025-05-17 00:37:34.652 [INFO][4432] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:34.716180 env[1418]: 2025-05-17 00:37:34.653 [INFO][4432] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.198/26] IPv6=[] ContainerID="6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e" HandleID="k8s-pod-network.6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0" May 17 00:37:34.717136 env[1418]: 2025-05-17 00:37:34.654 [INFO][4407] cni-plugin/k8s.go 418: Populated endpoint ContainerID="6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e" Namespace="kube-system" Pod="coredns-7c65d6cfc9-762rf" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"6f5898dd-362a-45eb-be33-c0265577ee40", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"", Pod:"coredns-7c65d6cfc9-762rf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie5f703aa071", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:34.717136 env[1418]: 2025-05-17 00:37:34.654 [INFO][4407] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.34.198/32] ContainerID="6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e" Namespace="kube-system" Pod="coredns-7c65d6cfc9-762rf" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0" May 17 00:37:34.717136 env[1418]: 2025-05-17 00:37:34.654 [INFO][4407] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie5f703aa071 ContainerID="6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e" Namespace="kube-system" Pod="coredns-7c65d6cfc9-762rf" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0" May 17 00:37:34.717136 env[1418]: 2025-05-17 00:37:34.681 [INFO][4407] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e" Namespace="kube-system" Pod="coredns-7c65d6cfc9-762rf" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0" May 17 00:37:34.717136 env[1418]: 2025-05-17 00:37:34.681 [INFO][4407] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e" Namespace="kube-system" Pod="coredns-7c65d6cfc9-762rf" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"6f5898dd-362a-45eb-be33-c0265577ee40", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e", Pod:"coredns-7c65d6cfc9-762rf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie5f703aa071", MAC:"16:10:9d:30:eb:9a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:34.717136 env[1418]: 2025-05-17 00:37:34.710 [INFO][4407] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e" Namespace="kube-system" Pod="coredns-7c65d6cfc9-762rf" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0" May 17 00:37:34.753882 env[1418]: time="2025-05-17T00:37:34.753317048Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:34.753882 env[1418]: time="2025-05-17T00:37:34.753409749Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:34.753882 env[1418]: time="2025-05-17T00:37:34.753444050Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:34.753882 env[1418]: time="2025-05-17T00:37:34.753598552Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e pid=4463 runtime=io.containerd.runc.v2 May 17 00:37:34.779951 systemd[1]: Started cri-containerd-6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e.scope. May 17 00:37:34.802174 systemd-networkd[1573]: cali0b7fe82a126: Link UP May 17 00:37:34.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.810000 audit: BPF prog-id=183 op=LOAD May 17 00:37:34.811000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.811000 audit[4476]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4463 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662613730346664366130313866376430626436393365343132326631 May 17 00:37:34.811000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.811000 audit[4476]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4463 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662613730346664366130313866376430626436393365343132326631 May 17 00:37:34.811000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.811000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.811000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.811000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.811000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.811000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.811000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.811000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.811000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.811000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.811000 audit: BPF prog-id=184 op=LOAD May 17 00:37:34.811000 audit[4476]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ccd80 items=0 ppid=4463 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.820439 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0b7fe82a126: link becomes ready May 17 00:37:34.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662613730346664366130313866376430626436393365343132326631 May 17 00:37:34.812000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.812000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.812000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.812000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.812000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.812000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.812000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.812000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.821103 systemd-networkd[1573]: cali0b7fe82a126: Gained carrier May 17 00:37:34.812000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.812000 audit: BPF prog-id=185 op=LOAD May 17 00:37:34.812000 audit[4476]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ccdc8 items=0 ppid=4463 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662613730346664366130313866376430626436393365343132326631 May 17 00:37:34.824000 audit: BPF prog-id=185 op=UNLOAD May 17 00:37:34.824000 audit: BPF prog-id=184 op=UNLOAD May 17 00:37:34.825000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.825000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.825000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.825000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.825000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.825000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.825000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.825000 audit[4476]: AVC avc: denied { perfmon } for pid=4476 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.825000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.825000 audit[4476]: AVC avc: denied { bpf } for pid=4476 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:34.825000 audit: BPF prog-id=186 op=LOAD May 17 00:37:34.825000 audit[4476]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001cd1d8 items=0 ppid=4463 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662613730346664366130313866376430626436393365343132326631 May 17 00:37:34.858971 env[1418]: 2025-05-17 00:37:34.555 [INFO][4420] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0 goldmane-8f77d7b6c- calico-system 6c0070f8-dd11-4a02-a60b-d807c5fc3160 981 0 2025-05-17 00:37:05 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:8f77d7b6c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s ci-3510.3.7-n-cef16a74b5 goldmane-8f77d7b6c-shhph eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali0b7fe82a126 [] [] }} ContainerID="2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1" Namespace="calico-system" Pod="goldmane-8f77d7b6c-shhph" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-" May 17 00:37:34.858971 env[1418]: 2025-05-17 00:37:34.555 [INFO][4420] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1" Namespace="calico-system" Pod="goldmane-8f77d7b6c-shhph" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0" May 17 00:37:34.858971 env[1418]: 2025-05-17 00:37:34.607 [INFO][4441] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1" HandleID="k8s-pod-network.2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1" Workload="ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0" May 17 00:37:34.858971 env[1418]: 2025-05-17 00:37:34.607 [INFO][4441] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1" HandleID="k8s-pod-network.2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1" Workload="ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1630), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-cef16a74b5", "pod":"goldmane-8f77d7b6c-shhph", "timestamp":"2025-05-17 00:37:34.607163771 +0000 UTC"}, Hostname:"ci-3510.3.7-n-cef16a74b5", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:37:34.858971 env[1418]: 2025-05-17 00:37:34.608 [INFO][4441] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:34.858971 env[1418]: 2025-05-17 00:37:34.652 [INFO][4441] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:34.858971 env[1418]: 2025-05-17 00:37:34.653 [INFO][4441] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-cef16a74b5' May 17 00:37:34.858971 env[1418]: 2025-05-17 00:37:34.694 [INFO][4441] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:34.858971 env[1418]: 2025-05-17 00:37:34.722 [INFO][4441] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:34.858971 env[1418]: 2025-05-17 00:37:34.728 [INFO][4441] ipam/ipam.go 511: Trying affinity for 192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:34.858971 env[1418]: 2025-05-17 00:37:34.730 [INFO][4441] ipam/ipam.go 158: Attempting to load block cidr=192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:34.858971 env[1418]: 2025-05-17 00:37:34.737 [INFO][4441] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:34.858971 env[1418]: 2025-05-17 00:37:34.737 [INFO][4441] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.34.192/26 handle="k8s-pod-network.2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:34.858971 env[1418]: 2025-05-17 00:37:34.750 [INFO][4441] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1 May 17 00:37:34.858971 env[1418]: 2025-05-17 00:37:34.762 [INFO][4441] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.34.192/26 handle="k8s-pod-network.2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:34.858971 env[1418]: 2025-05-17 00:37:34.795 [INFO][4441] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.34.199/26] block=192.168.34.192/26 handle="k8s-pod-network.2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:34.858971 env[1418]: 2025-05-17 00:37:34.795 [INFO][4441] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.34.199/26] handle="k8s-pod-network.2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:34.858971 env[1418]: 2025-05-17 00:37:34.795 [INFO][4441] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:34.858971 env[1418]: 2025-05-17 00:37:34.795 [INFO][4441] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.199/26] IPv6=[] ContainerID="2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1" HandleID="k8s-pod-network.2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1" Workload="ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0" May 17 00:37:34.859917 env[1418]: 2025-05-17 00:37:34.797 [INFO][4420] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1" Namespace="calico-system" Pod="goldmane-8f77d7b6c-shhph" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"6c0070f8-dd11-4a02-a60b-d807c5fc3160", ResourceVersion:"981", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"", Pod:"goldmane-8f77d7b6c-shhph", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.34.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali0b7fe82a126", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:34.859917 env[1418]: 2025-05-17 00:37:34.797 [INFO][4420] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.34.199/32] ContainerID="2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1" Namespace="calico-system" Pod="goldmane-8f77d7b6c-shhph" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0" May 17 00:37:34.859917 env[1418]: 2025-05-17 00:37:34.797 [INFO][4420] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0b7fe82a126 ContainerID="2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1" Namespace="calico-system" Pod="goldmane-8f77d7b6c-shhph" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0" May 17 00:37:34.859917 env[1418]: 2025-05-17 00:37:34.824 [INFO][4420] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1" Namespace="calico-system" Pod="goldmane-8f77d7b6c-shhph" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0" May 17 00:37:34.859917 env[1418]: 2025-05-17 00:37:34.824 [INFO][4420] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1" Namespace="calico-system" Pod="goldmane-8f77d7b6c-shhph" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"6c0070f8-dd11-4a02-a60b-d807c5fc3160", ResourceVersion:"981", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1", Pod:"goldmane-8f77d7b6c-shhph", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.34.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali0b7fe82a126", MAC:"8a:5d:fa:38:c1:1a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:34.859917 env[1418]: 2025-05-17 00:37:34.855 [INFO][4420] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1" Namespace="calico-system" Pod="goldmane-8f77d7b6c-shhph" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0" May 17 00:37:34.868000 audit[4494]: NETFILTER_CFG table=filter:122 family=2 entries=48 op=nft_register_chain pid=4494 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:34.868000 audit[4494]: SYSCALL arch=c000003e syscall=46 success=yes exit=22720 a0=3 a1=7ffd6f319fe0 a2=0 a3=7ffd6f319fcc items=0 ppid=3764 pid=4494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.868000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:34.879399 env[1418]: time="2025-05-17T00:37:34.879349211Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-762rf,Uid:6f5898dd-362a-45eb-be33-c0265577ee40,Namespace:kube-system,Attempt:1,} returns sandbox id \"6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e\"" May 17 00:37:34.883396 env[1418]: time="2025-05-17T00:37:34.883360474Z" level=info msg="CreateContainer within sandbox \"6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:37:34.902717 env[1418]: time="2025-05-17T00:37:34.899587227Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:34.902717 env[1418]: time="2025-05-17T00:37:34.899652828Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:34.902717 env[1418]: time="2025-05-17T00:37:34.899667628Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:34.902717 env[1418]: time="2025-05-17T00:37:34.899825630Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1 pid=4513 runtime=io.containerd.runc.v2 May 17 00:37:34.934789 systemd[1]: Started cri-containerd-2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1.scope. May 17 00:37:34.936576 env[1418]: time="2025-05-17T00:37:34.936532702Z" level=info msg="CreateContainer within sandbox \"6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b7ea22e5650a9913dcf4e6b7e6b3963234d22eab72506a9ca99e7daaf703301c\"" May 17 00:37:34.938114 env[1418]: time="2025-05-17T00:37:34.938077626Z" level=info msg="StartContainer for \"b7ea22e5650a9913dcf4e6b7e6b3963234d22eab72506a9ca99e7daaf703301c\"" May 17 00:37:34.964000 audit[4547]: NETFILTER_CFG table=filter:123 family=2 entries=64 op=nft_register_chain pid=4547 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:34.964000 audit[4547]: SYSCALL arch=c000003e syscall=46 success=yes exit=31120 a0=3 a1=7fffbf873dd0 a2=0 a3=7fffbf873dbc items=0 ppid=3764 pid=4547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.964000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:34.974702 systemd[1]: Started cri-containerd-b7ea22e5650a9913dcf4e6b7e6b3963234d22eab72506a9ca99e7daaf703301c.scope. May 17 00:37:35.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.022000 audit: BPF prog-id=187 op=LOAD May 17 00:37:35.028000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.028000 audit[4542]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4463 pid=4542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237656132326535363530613939313364636634653662376536623339 May 17 00:37:35.028000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.028000 audit[4542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4463 pid=4542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237656132326535363530613939313364636634653662376536623339 May 17 00:37:35.031000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.031000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.031000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.031000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.031000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.031000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.031000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.031000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.031000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.031000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.031000 audit: BPF prog-id=188 op=LOAD May 17 00:37:35.031000 audit[4542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001914d0 items=0 ppid=4463 pid=4542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237656132326535363530613939313364636634653662376536623339 May 17 00:37:35.032000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.032000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.032000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.032000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.032000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.032000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.032000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.032000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.032000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.032000 audit: BPF prog-id=189 op=LOAD May 17 00:37:35.032000 audit[4542]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000191518 items=0 ppid=4463 pid=4542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237656132326535363530613939313364636634653662376536623339 May 17 00:37:35.033000 audit: BPF prog-id=189 op=UNLOAD May 17 00:37:35.033000 audit: BPF prog-id=188 op=UNLOAD May 17 00:37:35.033000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.033000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.033000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.033000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.033000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.033000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.033000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.033000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.033000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.033000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.033000 audit: BPF prog-id=190 op=LOAD May 17 00:37:35.033000 audit[4542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000191928 items=0 ppid=4463 pid=4542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237656132326535363530613939313364636634653662376536623339 May 17 00:37:35.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.060000 audit: BPF prog-id=191 op=LOAD May 17 00:37:35.062000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.062000 audit[4525]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4513 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234323631383563343564366437383236383435616466373063656233 May 17 00:37:35.062000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.062000 audit[4525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4513 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234323631383563343564366437383236383435616466373063656233 May 17 00:37:35.063000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.063000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.063000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.063000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.063000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.063000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.063000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.063000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.063000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.063000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.063000 audit: BPF prog-id=192 op=LOAD May 17 00:37:35.063000 audit[4525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00021b160 items=0 ppid=4513 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234323631383563343564366437383236383435616466373063656233 May 17 00:37:35.065000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.065000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.065000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.065000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.065000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.065000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.065000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.065000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.065000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.065000 audit: BPF prog-id=193 op=LOAD May 17 00:37:35.065000 audit[4525]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00021b1a8 items=0 ppid=4513 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234323631383563343564366437383236383435616466373063656233 May 17 00:37:35.065000 audit: BPF prog-id=193 op=UNLOAD May 17 00:37:35.066000 audit: BPF prog-id=192 op=UNLOAD May 17 00:37:35.066000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.066000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.066000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.066000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.066000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.066000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.066000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.066000 audit[4525]: AVC avc: denied { perfmon } for pid=4525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.066000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.066000 audit[4525]: AVC avc: denied { bpf } for pid=4525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.066000 audit: BPF prog-id=194 op=LOAD May 17 00:37:35.066000 audit[4525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00021b5b8 items=0 ppid=4513 pid=4525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234323631383563343564366437383236383435616466373063656233 May 17 00:37:35.077972 env[1418]: time="2025-05-17T00:37:35.077926686Z" level=info msg="StartContainer for \"b7ea22e5650a9913dcf4e6b7e6b3963234d22eab72506a9ca99e7daaf703301c\" returns successfully" May 17 00:37:35.084052 env[1418]: time="2025-05-17T00:37:35.084020679Z" level=info msg="StopPodSandbox for \"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\"" May 17 00:37:35.102000 audit[4555]: AVC avc: denied { getattr } for pid=4555 comm="coredns" path="cgroup:[4026532754]" dev="nsfs" ino=4026532754 scontext=system_u:system_r:svirt_lxc_net_t:s0:c210,c396 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:37:35.102000 audit[4555]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aa38 a2=c0000c4fa8 a3=0 items=0 ppid=4463 pid=4555 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c210,c396 key=(null) May 17 00:37:35.102000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:37:35.192365 env[1418]: time="2025-05-17T00:37:35.192318739Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-shhph,Uid:6c0070f8-dd11-4a02-a60b-d807c5fc3160,Namespace:calico-system,Attempt:1,} returns sandbox id \"2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1\"" May 17 00:37:35.244880 systemd-networkd[1573]: cali1bdb5a298da: Gained IPv6LL May 17 00:37:35.286025 env[1418]: 2025-05-17 00:37:35.228 [INFO][4586] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" May 17 00:37:35.286025 env[1418]: 2025-05-17 00:37:35.228 [INFO][4586] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" iface="eth0" netns="/var/run/netns/cni-24d782bb-763d-6e3b-9891-fd8bc1bdec5a" May 17 00:37:35.286025 env[1418]: 2025-05-17 00:37:35.229 [INFO][4586] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" iface="eth0" netns="/var/run/netns/cni-24d782bb-763d-6e3b-9891-fd8bc1bdec5a" May 17 00:37:35.286025 env[1418]: 2025-05-17 00:37:35.230 [INFO][4586] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" iface="eth0" netns="/var/run/netns/cni-24d782bb-763d-6e3b-9891-fd8bc1bdec5a" May 17 00:37:35.286025 env[1418]: 2025-05-17 00:37:35.230 [INFO][4586] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" May 17 00:37:35.286025 env[1418]: 2025-05-17 00:37:35.231 [INFO][4586] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" May 17 00:37:35.286025 env[1418]: 2025-05-17 00:37:35.273 [INFO][4602] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" HandleID="k8s-pod-network.254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" Workload="ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0" May 17 00:37:35.286025 env[1418]: 2025-05-17 00:37:35.273 [INFO][4602] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:35.286025 env[1418]: 2025-05-17 00:37:35.274 [INFO][4602] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:35.286025 env[1418]: 2025-05-17 00:37:35.281 [WARNING][4602] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" HandleID="k8s-pod-network.254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" Workload="ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0" May 17 00:37:35.286025 env[1418]: 2025-05-17 00:37:35.281 [INFO][4602] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" HandleID="k8s-pod-network.254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" Workload="ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0" May 17 00:37:35.286025 env[1418]: 2025-05-17 00:37:35.282 [INFO][4602] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:35.286025 env[1418]: 2025-05-17 00:37:35.284 [INFO][4586] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" May 17 00:37:35.294825 env[1418]: time="2025-05-17T00:37:35.292240271Z" level=info msg="TearDown network for sandbox \"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\" successfully" May 17 00:37:35.294825 env[1418]: time="2025-05-17T00:37:35.292291571Z" level=info msg="StopPodSandbox for \"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\" returns successfully" May 17 00:37:35.293366 systemd[1]: run-netns-cni\x2d24d782bb\x2d763d\x2d6e3b\x2d9891\x2dfd8bc1bdec5a.mount: Deactivated successfully. May 17 00:37:35.300066 env[1418]: time="2025-05-17T00:37:35.300033590Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ggd4c,Uid:229d7143-68c7-4436-b5a7-e1de78e6c47a,Namespace:calico-system,Attempt:1,}" May 17 00:37:35.394396 kubelet[2411]: I0517 00:37:35.393482 2411 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-762rf" podStartSLOduration=43.393462022 podStartE2EDuration="43.393462022s" podCreationTimestamp="2025-05-17 00:36:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:37:35.393376121 +0000 UTC m=+50.045321931" watchObservedRunningTime="2025-05-17 00:37:35.393462022 +0000 UTC m=+50.045407832" May 17 00:37:35.451000 audit[4621]: NETFILTER_CFG table=filter:124 family=2 entries=14 op=nft_register_rule pid=4621 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:35.451000 audit[4621]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe4766e0d0 a2=0 a3=7ffe4766e0bc items=0 ppid=2515 pid=4621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.451000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:35.459000 audit[4621]: NETFILTER_CFG table=nat:125 family=2 entries=44 op=nft_register_rule pid=4621 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:35.459000 audit[4621]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe4766e0d0 a2=0 a3=7ffe4766e0bc items=0 ppid=2515 pid=4621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.459000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:35.500930 systemd-networkd[1573]: calib006699f912: Gained IPv6LL May 17 00:37:35.556619 systemd-networkd[1573]: calid8954e7bc60: Link UP May 17 00:37:35.570067 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid8954e7bc60: link becomes ready May 17 00:37:35.567894 systemd-networkd[1573]: calid8954e7bc60: Gained carrier May 17 00:37:35.618855 env[1418]: 2025-05-17 00:37:35.453 [INFO][4608] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0 csi-node-driver- calico-system 229d7143-68c7-4436-b5a7-e1de78e6c47a 996 0 2025-05-17 00:37:06 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:68bf44dd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.7-n-cef16a74b5 csi-node-driver-ggd4c eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calid8954e7bc60 [] [] }} ContainerID="6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040" Namespace="calico-system" Pod="csi-node-driver-ggd4c" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-" May 17 00:37:35.618855 env[1418]: 2025-05-17 00:37:35.453 [INFO][4608] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040" Namespace="calico-system" Pod="csi-node-driver-ggd4c" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0" May 17 00:37:35.618855 env[1418]: 2025-05-17 00:37:35.502 [INFO][4624] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040" HandleID="k8s-pod-network.6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040" Workload="ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0" May 17 00:37:35.618855 env[1418]: 2025-05-17 00:37:35.502 [INFO][4624] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040" HandleID="k8s-pod-network.6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040" Workload="ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9020), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-cef16a74b5", "pod":"csi-node-driver-ggd4c", "timestamp":"2025-05-17 00:37:35.502040086 +0000 UTC"}, Hostname:"ci-3510.3.7-n-cef16a74b5", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:37:35.618855 env[1418]: 2025-05-17 00:37:35.502 [INFO][4624] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:35.618855 env[1418]: 2025-05-17 00:37:35.502 [INFO][4624] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:35.618855 env[1418]: 2025-05-17 00:37:35.502 [INFO][4624] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-cef16a74b5' May 17 00:37:35.618855 env[1418]: 2025-05-17 00:37:35.509 [INFO][4624] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:35.618855 env[1418]: 2025-05-17 00:37:35.514 [INFO][4624] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:35.618855 env[1418]: 2025-05-17 00:37:35.518 [INFO][4624] ipam/ipam.go 511: Trying affinity for 192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:35.618855 env[1418]: 2025-05-17 00:37:35.520 [INFO][4624] ipam/ipam.go 158: Attempting to load block cidr=192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:35.618855 env[1418]: 2025-05-17 00:37:35.526 [INFO][4624] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:35.618855 env[1418]: 2025-05-17 00:37:35.526 [INFO][4624] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.34.192/26 handle="k8s-pod-network.6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:35.618855 env[1418]: 2025-05-17 00:37:35.528 [INFO][4624] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040 May 17 00:37:35.618855 env[1418]: 2025-05-17 00:37:35.538 [INFO][4624] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.34.192/26 handle="k8s-pod-network.6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:35.618855 env[1418]: 2025-05-17 00:37:35.549 [INFO][4624] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.34.200/26] block=192.168.34.192/26 handle="k8s-pod-network.6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:35.618855 env[1418]: 2025-05-17 00:37:35.549 [INFO][4624] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.34.200/26] handle="k8s-pod-network.6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:35.618855 env[1418]: 2025-05-17 00:37:35.549 [INFO][4624] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:35.618855 env[1418]: 2025-05-17 00:37:35.549 [INFO][4624] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.200/26] IPv6=[] ContainerID="6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040" HandleID="k8s-pod-network.6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040" Workload="ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0" May 17 00:37:35.619821 env[1418]: 2025-05-17 00:37:35.552 [INFO][4608] cni-plugin/k8s.go 418: Populated endpoint ContainerID="6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040" Namespace="calico-system" Pod="csi-node-driver-ggd4c" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"229d7143-68c7-4436-b5a7-e1de78e6c47a", ResourceVersion:"996", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"", Pod:"csi-node-driver-ggd4c", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.34.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid8954e7bc60", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:35.619821 env[1418]: 2025-05-17 00:37:35.552 [INFO][4608] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.34.200/32] ContainerID="6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040" Namespace="calico-system" Pod="csi-node-driver-ggd4c" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0" May 17 00:37:35.619821 env[1418]: 2025-05-17 00:37:35.552 [INFO][4608] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid8954e7bc60 ContainerID="6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040" Namespace="calico-system" Pod="csi-node-driver-ggd4c" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0" May 17 00:37:35.619821 env[1418]: 2025-05-17 00:37:35.593 [INFO][4608] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040" Namespace="calico-system" Pod="csi-node-driver-ggd4c" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0" May 17 00:37:35.619821 env[1418]: 2025-05-17 00:37:35.595 [INFO][4608] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040" Namespace="calico-system" Pod="csi-node-driver-ggd4c" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"229d7143-68c7-4436-b5a7-e1de78e6c47a", ResourceVersion:"996", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040", Pod:"csi-node-driver-ggd4c", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.34.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid8954e7bc60", MAC:"fa:9e:e4:1e:44:3c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:35.619821 env[1418]: 2025-05-17 00:37:35.616 [INFO][4608] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040" Namespace="calico-system" Pod="csi-node-driver-ggd4c" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0" May 17 00:37:35.647305 env[1418]: time="2025-05-17T00:37:35.647228011Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:35.647469 env[1418]: time="2025-05-17T00:37:35.647310013Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:35.647469 env[1418]: time="2025-05-17T00:37:35.647336113Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:35.647820 env[1418]: time="2025-05-17T00:37:35.647778620Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040 pid=4649 runtime=io.containerd.runc.v2 May 17 00:37:35.656000 audit[4657]: NETFILTER_CFG table=filter:126 family=2 entries=60 op=nft_register_chain pid=4657 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:35.656000 audit[4657]: SYSCALL arch=c000003e syscall=46 success=yes exit=26704 a0=3 a1=7fff4ecb96f0 a2=0 a3=7fff4ecb96dc items=0 ppid=3764 pid=4657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.656000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:35.697977 systemd[1]: Started cri-containerd-6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040.scope. May 17 00:37:35.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.734000 audit: BPF prog-id=195 op=LOAD May 17 00:37:35.735000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.735000 audit[4658]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4649 pid=4658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634383133383761333863326162623661643262316333386162346565 May 17 00:37:35.735000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.735000 audit[4658]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4649 pid=4658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634383133383761333863326162623661643262316333386162346565 May 17 00:37:35.735000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.735000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.735000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.735000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.735000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.735000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.735000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.735000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.735000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.735000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.735000 audit: BPF prog-id=196 op=LOAD May 17 00:37:35.735000 audit[4658]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00024d5c0 items=0 ppid=4649 pid=4658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634383133383761333863326162623661643262316333386162346565 May 17 00:37:35.736000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.736000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.736000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.736000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.736000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.736000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.736000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.736000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.736000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.736000 audit: BPF prog-id=197 op=LOAD May 17 00:37:35.736000 audit[4658]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00024d608 items=0 ppid=4649 pid=4658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634383133383761333863326162623661643262316333386162346565 May 17 00:37:35.736000 audit: BPF prog-id=197 op=UNLOAD May 17 00:37:35.736000 audit: BPF prog-id=196 op=UNLOAD May 17 00:37:35.736000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.736000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.736000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.736000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.736000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.736000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.736000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.736000 audit[4658]: AVC avc: denied { perfmon } for pid=4658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.736000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.736000 audit[4658]: AVC avc: denied { bpf } for pid=4658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:35.736000 audit: BPF prog-id=198 op=LOAD May 17 00:37:35.736000 audit[4658]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00024da18 items=0 ppid=4649 pid=4658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634383133383761333863326162623661643262316333386162346565 May 17 00:37:35.795926 env[1418]: time="2025-05-17T00:37:35.795856789Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ggd4c,Uid:229d7143-68c7-4436-b5a7-e1de78e6c47a,Namespace:calico-system,Attempt:1,} returns sandbox id \"6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040\"" May 17 00:37:36.205315 systemd-networkd[1573]: cali0b7fe82a126: Gained IPv6LL May 17 00:37:36.277886 env[1418]: time="2025-05-17T00:37:36.277845009Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:36.288106 env[1418]: time="2025-05-17T00:37:36.288063663Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:36.292863 env[1418]: time="2025-05-17T00:37:36.292827735Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:36.298542 env[1418]: time="2025-05-17T00:37:36.298509120Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:36.298982 env[1418]: time="2025-05-17T00:37:36.298949527Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:37:36.300972 env[1418]: time="2025-05-17T00:37:36.300936557Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:37:36.302812 env[1418]: time="2025-05-17T00:37:36.302783185Z" level=info msg="CreateContainer within sandbox \"daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:37:36.364078 env[1418]: time="2025-05-17T00:37:36.364025009Z" level=info msg="CreateContainer within sandbox \"daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"5820f70ee46a34b6867dba0f7794708f9b023f1fe207e4dc56167a2ed269b4c1\"" May 17 00:37:36.364631 env[1418]: time="2025-05-17T00:37:36.364597617Z" level=info msg="StartContainer for \"5820f70ee46a34b6867dba0f7794708f9b023f1fe207e4dc56167a2ed269b4c1\"" May 17 00:37:36.393896 systemd[1]: Started cri-containerd-5820f70ee46a34b6867dba0f7794708f9b023f1fe207e4dc56167a2ed269b4c1.scope. May 17 00:37:36.429000 audit[4708]: NETFILTER_CFG table=filter:127 family=2 entries=14 op=nft_register_rule pid=4708 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:36.429000 audit[4708]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff048ecc00 a2=0 a3=7fff048ecbec items=0 ppid=2515 pid=4708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:36.429000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:36.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.440000 audit: BPF prog-id=199 op=LOAD May 17 00:37:36.441000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.441000 audit[4695]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4048 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:36.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538323066373065653436613334623638363764626130663737393437 May 17 00:37:36.442000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.442000 audit[4695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4048 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:36.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538323066373065653436613334623638363764626130663737393437 May 17 00:37:36.442000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.442000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.441000 audit[4708]: NETFILTER_CFG table=nat:128 family=2 entries=56 op=nft_register_chain pid=4708 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:36.441000 audit[4708]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff048ecc00 a2=0 a3=7fff048ecbec items=0 ppid=2515 pid=4708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:36.441000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:36.442000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.442000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.442000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.442000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.442000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.442000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.442000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.442000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.442000 audit: BPF prog-id=200 op=LOAD May 17 00:37:36.442000 audit[4695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000385eb0 items=0 ppid=4048 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:36.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538323066373065653436613334623638363764626130663737393437 May 17 00:37:36.443000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.443000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.443000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.443000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.443000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.443000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.443000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.443000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.443000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.443000 audit: BPF prog-id=201 op=LOAD May 17 00:37:36.443000 audit[4695]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000385ef8 items=0 ppid=4048 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:36.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538323066373065653436613334623638363764626130663737393437 May 17 00:37:36.443000 audit: BPF prog-id=201 op=UNLOAD May 17 00:37:36.443000 audit: BPF prog-id=200 op=UNLOAD May 17 00:37:36.443000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.443000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.443000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.443000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.443000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.443000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.443000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.443000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.443000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.443000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.443000 audit: BPF prog-id=202 op=LOAD May 17 00:37:36.443000 audit[4695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e0308 items=0 ppid=4048 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:36.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538323066373065653436613334623638363764626130663737393437 May 17 00:37:36.483897 env[1418]: time="2025-05-17T00:37:36.480898871Z" level=info msg="StartContainer for \"5820f70ee46a34b6867dba0f7794708f9b023f1fe207e4dc56167a2ed269b4c1\" returns successfully" May 17 00:37:36.652982 systemd-networkd[1573]: calie5f703aa071: Gained IPv6LL May 17 00:37:36.669128 env[1418]: time="2025-05-17T00:37:36.669083109Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:36.678998 env[1418]: time="2025-05-17T00:37:36.678963458Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:36.684630 env[1418]: time="2025-05-17T00:37:36.684601343Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:36.691798 env[1418]: time="2025-05-17T00:37:36.691770451Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:36.692544 env[1418]: time="2025-05-17T00:37:36.692513363Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:37:36.696486 env[1418]: time="2025-05-17T00:37:36.696461422Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\"" May 17 00:37:36.697560 env[1418]: time="2025-05-17T00:37:36.697533038Z" level=info msg="CreateContainer within sandbox \"43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:37:36.729951 env[1418]: time="2025-05-17T00:37:36.729889226Z" level=info msg="CreateContainer within sandbox \"43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"2b805528d6653bf6f49f172bedab1b0b65e43ed82c8d6a53c10da14ecfc78d8b\"" May 17 00:37:36.731476 env[1418]: time="2025-05-17T00:37:36.731446950Z" level=info msg="StartContainer for \"2b805528d6653bf6f49f172bedab1b0b65e43ed82c8d6a53c10da14ecfc78d8b\"" May 17 00:37:36.754060 systemd[1]: Started cri-containerd-2b805528d6653bf6f49f172bedab1b0b65e43ed82c8d6a53c10da14ecfc78d8b.scope. May 17 00:37:36.780954 systemd-networkd[1573]: calid8954e7bc60: Gained IPv6LL May 17 00:37:36.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.797000 audit: BPF prog-id=203 op=LOAD May 17 00:37:36.798000 audit[4742]: AVC avc: denied { bpf } for pid=4742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.798000 audit[4742]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4274 pid=4742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:36.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262383035353238643636353362663666343966313732626564616231 May 17 00:37:36.798000 audit[4742]: AVC avc: denied { perfmon } for pid=4742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.798000 audit[4742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4274 pid=4742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:36.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262383035353238643636353362663666343966313732626564616231 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { bpf } for pid=4742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { bpf } for pid=4742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { bpf } for pid=4742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { perfmon } for pid=4742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { perfmon } for pid=4742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { perfmon } for pid=4742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { perfmon } for pid=4742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { perfmon } for pid=4742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { bpf } for pid=4742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { bpf } for pid=4742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit: BPF prog-id=204 op=LOAD May 17 00:37:36.799000 audit[4742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00022d240 items=0 ppid=4274 pid=4742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:36.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262383035353238643636353362663666343966313732626564616231 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { bpf } for pid=4742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { bpf } for pid=4742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { perfmon } for pid=4742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { perfmon } for pid=4742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { perfmon } for pid=4742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { perfmon } for pid=4742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { perfmon } for pid=4742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { bpf } for pid=4742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { bpf } for pid=4742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit: BPF prog-id=205 op=LOAD May 17 00:37:36.799000 audit[4742]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00022d288 items=0 ppid=4274 pid=4742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:36.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262383035353238643636353362663666343966313732626564616231 May 17 00:37:36.799000 audit: BPF prog-id=205 op=UNLOAD May 17 00:37:36.799000 audit: BPF prog-id=204 op=UNLOAD May 17 00:37:36.799000 audit[4742]: AVC avc: denied { bpf } for pid=4742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { bpf } for pid=4742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { bpf } for pid=4742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { perfmon } for pid=4742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { perfmon } for pid=4742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { perfmon } for pid=4742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { perfmon } for pid=4742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { perfmon } for pid=4742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { bpf } for pid=4742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit[4742]: AVC avc: denied { bpf } for pid=4742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:36.799000 audit: BPF prog-id=206 op=LOAD May 17 00:37:36.799000 audit[4742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00022d698 items=0 ppid=4274 pid=4742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:36.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262383035353238643636353362663666343966313732626564616231 May 17 00:37:36.854351 env[1418]: time="2025-05-17T00:37:36.854298003Z" level=info msg="StartContainer for \"2b805528d6653bf6f49f172bedab1b0b65e43ed82c8d6a53c10da14ecfc78d8b\" returns successfully" May 17 00:37:37.086719 env[1418]: time="2025-05-17T00:37:37.086675687Z" level=info msg="StopPodSandbox for \"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\"" May 17 00:37:37.212818 env[1418]: 2025-05-17 00:37:37.162 [INFO][4785] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" May 17 00:37:37.212818 env[1418]: 2025-05-17 00:37:37.162 [INFO][4785] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" iface="eth0" netns="/var/run/netns/cni-4f3cf3a0-04aa-8b89-c9e7-dd4f8b577688" May 17 00:37:37.212818 env[1418]: 2025-05-17 00:37:37.162 [INFO][4785] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" iface="eth0" netns="/var/run/netns/cni-4f3cf3a0-04aa-8b89-c9e7-dd4f8b577688" May 17 00:37:37.212818 env[1418]: 2025-05-17 00:37:37.162 [INFO][4785] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" iface="eth0" netns="/var/run/netns/cni-4f3cf3a0-04aa-8b89-c9e7-dd4f8b577688" May 17 00:37:37.212818 env[1418]: 2025-05-17 00:37:37.162 [INFO][4785] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" May 17 00:37:37.212818 env[1418]: 2025-05-17 00:37:37.162 [INFO][4785] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" May 17 00:37:37.212818 env[1418]: 2025-05-17 00:37:37.201 [INFO][4792] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" HandleID="k8s-pod-network.382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:37:37.212818 env[1418]: 2025-05-17 00:37:37.201 [INFO][4792] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:37.212818 env[1418]: 2025-05-17 00:37:37.202 [INFO][4792] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:37.212818 env[1418]: 2025-05-17 00:37:37.208 [WARNING][4792] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" HandleID="k8s-pod-network.382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:37:37.212818 env[1418]: 2025-05-17 00:37:37.208 [INFO][4792] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" HandleID="k8s-pod-network.382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:37:37.212818 env[1418]: 2025-05-17 00:37:37.209 [INFO][4792] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:37.212818 env[1418]: 2025-05-17 00:37:37.211 [INFO][4785] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" May 17 00:37:37.213651 env[1418]: time="2025-05-17T00:37:37.213587371Z" level=info msg="TearDown network for sandbox \"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\" successfully" May 17 00:37:37.213794 env[1418]: time="2025-05-17T00:37:37.213650171Z" level=info msg="StopPodSandbox for \"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\" returns successfully" May 17 00:37:37.214484 env[1418]: time="2025-05-17T00:37:37.214448083Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c994b7d8-hgp4q,Uid:a22d7efa-452f-4f58-901c-3556264cc279,Namespace:calico-apiserver,Attempt:1,}" May 17 00:37:37.222741 systemd[1]: run-containerd-runc-k8s.io-5820f70ee46a34b6867dba0f7794708f9b023f1fe207e4dc56167a2ed269b4c1-runc.ausVnj.mount: Deactivated successfully. May 17 00:37:37.223060 systemd[1]: run-netns-cni\x2d4f3cf3a0\x2d04aa\x2d8b89\x2dc9e7\x2ddd4f8b577688.mount: Deactivated successfully. May 17 00:37:37.464435 kubelet[2411]: I0517 00:37:37.464236 2411 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7bd946bb48-2lg62" podStartSLOduration=31.54382493 podStartE2EDuration="34.464211891s" podCreationTimestamp="2025-05-17 00:37:03 +0000 UTC" firstStartedPulling="2025-05-17 00:37:33.77333262 +0000 UTC m=+48.425278430" lastFinishedPulling="2025-05-17 00:37:36.693719681 +0000 UTC m=+51.345665391" observedRunningTime="2025-05-17 00:37:37.430874896 +0000 UTC m=+52.082820606" watchObservedRunningTime="2025-05-17 00:37:37.464211891 +0000 UTC m=+52.116157701" May 17 00:37:37.477000 audit[4818]: NETFILTER_CFG table=filter:129 family=2 entries=14 op=nft_register_rule pid=4818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:37.477000 audit[4818]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe982dc1c0 a2=0 a3=7ffe982dc1ac items=0 ppid=2515 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:37.477000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:37.482000 audit[4818]: NETFILTER_CFG table=nat:130 family=2 entries=20 op=nft_register_rule pid=4818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:37.482000 audit[4818]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe982dc1c0 a2=0 a3=7ffe982dc1ac items=0 ppid=2515 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:37.482000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:37.521967 kernel: kauditd_printk_skb: 674 callbacks suppressed May 17 00:37:37.522125 kernel: audit: type=1325 audit(1747442257.506:1370): table=filter:131 family=2 entries=14 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:37.506000 audit[4820]: NETFILTER_CFG table=filter:131 family=2 entries=14 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:37.550924 kernel: audit: type=1300 audit(1747442257.506:1370): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd1afcb220 a2=0 a3=7ffd1afcb20c items=0 ppid=2515 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:37.506000 audit[4820]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd1afcb220 a2=0 a3=7ffd1afcb20c items=0 ppid=2515 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:37.554406 systemd-networkd[1573]: cali4fd132d924c: Link UP May 17 00:37:37.573826 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:37:37.575159 kernel: audit: type=1327 audit(1747442257.506:1370): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:37.575227 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4fd132d924c: link becomes ready May 17 00:37:37.575257 kernel: audit: type=1325 audit(1747442257.535:1371): table=nat:132 family=2 entries=20 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:37.506000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:37.535000 audit[4820]: NETFILTER_CFG table=nat:132 family=2 entries=20 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:37.583844 systemd-networkd[1573]: cali4fd132d924c: Gained carrier May 17 00:37:37.535000 audit[4820]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd1afcb220 a2=0 a3=7ffd1afcb20c items=0 ppid=2515 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:37.613793 kernel: audit: type=1300 audit(1747442257.535:1371): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd1afcb220 a2=0 a3=7ffd1afcb20c items=0 ppid=2515 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:37.614668 kubelet[2411]: I0517 00:37:37.614602 2411 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5c994b7d8-c8j4r" podStartSLOduration=32.024788781 podStartE2EDuration="35.614581323s" podCreationTimestamp="2025-05-17 00:37:02 +0000 UTC" firstStartedPulling="2025-05-17 00:37:32.710467405 +0000 UTC m=+47.362413215" lastFinishedPulling="2025-05-17 00:37:36.300260047 +0000 UTC m=+50.952205757" observedRunningTime="2025-05-17 00:37:37.464069889 +0000 UTC m=+52.116015699" watchObservedRunningTime="2025-05-17 00:37:37.614581323 +0000 UTC m=+52.266527133" May 17 00:37:37.617435 env[1418]: 2025-05-17 00:37:37.341 [INFO][4799] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0 calico-apiserver-5c994b7d8- calico-apiserver a22d7efa-452f-4f58-901c-3556264cc279 1020 0 2025-05-17 00:37:02 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5c994b7d8 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-cef16a74b5 calico-apiserver-5c994b7d8-hgp4q eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali4fd132d924c [] [] }} ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" Namespace="calico-apiserver" Pod="calico-apiserver-5c994b7d8-hgp4q" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-" May 17 00:37:37.617435 env[1418]: 2025-05-17 00:37:37.342 [INFO][4799] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" Namespace="calico-apiserver" Pod="calico-apiserver-5c994b7d8-hgp4q" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:37:37.617435 env[1418]: 2025-05-17 00:37:37.398 [INFO][4810] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" HandleID="k8s-pod-network.f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:37:37.617435 env[1418]: 2025-05-17 00:37:37.399 [INFO][4810] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" HandleID="k8s-pod-network.f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9630), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-cef16a74b5", "pod":"calico-apiserver-5c994b7d8-hgp4q", "timestamp":"2025-05-17 00:37:37.39878642 +0000 UTC"}, Hostname:"ci-3510.3.7-n-cef16a74b5", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:37:37.617435 env[1418]: 2025-05-17 00:37:37.399 [INFO][4810] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:37.617435 env[1418]: 2025-05-17 00:37:37.399 [INFO][4810] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:37.617435 env[1418]: 2025-05-17 00:37:37.399 [INFO][4810] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-cef16a74b5' May 17 00:37:37.617435 env[1418]: 2025-05-17 00:37:37.417 [INFO][4810] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:37.617435 env[1418]: 2025-05-17 00:37:37.434 [INFO][4810] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:37.617435 env[1418]: 2025-05-17 00:37:37.450 [INFO][4810] ipam/ipam.go 511: Trying affinity for 192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:37.617435 env[1418]: 2025-05-17 00:37:37.462 [INFO][4810] ipam/ipam.go 158: Attempting to load block cidr=192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:37.617435 env[1418]: 2025-05-17 00:37:37.469 [INFO][4810] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:37.617435 env[1418]: 2025-05-17 00:37:37.469 [INFO][4810] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.34.192/26 handle="k8s-pod-network.f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:37.617435 env[1418]: 2025-05-17 00:37:37.476 [INFO][4810] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f May 17 00:37:37.617435 env[1418]: 2025-05-17 00:37:37.488 [INFO][4810] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.34.192/26 handle="k8s-pod-network.f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:37.617435 env[1418]: 2025-05-17 00:37:37.502 [INFO][4810] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.34.201/26] block=192.168.34.192/26 handle="k8s-pod-network.f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:37.617435 env[1418]: 2025-05-17 00:37:37.502 [INFO][4810] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.34.201/26] handle="k8s-pod-network.f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:37.617435 env[1418]: 2025-05-17 00:37:37.502 [INFO][4810] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:37.617435 env[1418]: 2025-05-17 00:37:37.502 [INFO][4810] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.201/26] IPv6=[] ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" HandleID="k8s-pod-network.f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:37:37.618783 env[1418]: 2025-05-17 00:37:37.504 [INFO][4799] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" Namespace="calico-apiserver" Pod="calico-apiserver-5c994b7d8-hgp4q" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0", GenerateName:"calico-apiserver-5c994b7d8-", Namespace:"calico-apiserver", SelfLink:"", UID:"a22d7efa-452f-4f58-901c-3556264cc279", ResourceVersion:"1020", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c994b7d8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"", Pod:"calico-apiserver-5c994b7d8-hgp4q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.201/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4fd132d924c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:37.618783 env[1418]: 2025-05-17 00:37:37.504 [INFO][4799] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.34.201/32] ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" Namespace="calico-apiserver" Pod="calico-apiserver-5c994b7d8-hgp4q" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:37:37.618783 env[1418]: 2025-05-17 00:37:37.504 [INFO][4799] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4fd132d924c ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" Namespace="calico-apiserver" Pod="calico-apiserver-5c994b7d8-hgp4q" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:37:37.618783 env[1418]: 2025-05-17 00:37:37.585 [INFO][4799] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" Namespace="calico-apiserver" Pod="calico-apiserver-5c994b7d8-hgp4q" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:37:37.618783 env[1418]: 2025-05-17 00:37:37.586 [INFO][4799] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" Namespace="calico-apiserver" Pod="calico-apiserver-5c994b7d8-hgp4q" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0", GenerateName:"calico-apiserver-5c994b7d8-", Namespace:"calico-apiserver", SelfLink:"", UID:"a22d7efa-452f-4f58-901c-3556264cc279", ResourceVersion:"1020", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c994b7d8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f", Pod:"calico-apiserver-5c994b7d8-hgp4q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.201/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4fd132d924c", MAC:"42:8e:9c:9d:58:75", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:37.618783 env[1418]: 2025-05-17 00:37:37.615 [INFO][4799] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" Namespace="calico-apiserver" Pod="calico-apiserver-5c994b7d8-hgp4q" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:37:37.535000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:37.633778 kernel: audit: type=1327 audit(1747442257.535:1371): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:37.649579 env[1418]: time="2025-05-17T00:37:37.649513941Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:37.649949 env[1418]: time="2025-05-17T00:37:37.649861847Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:37.650121 env[1418]: time="2025-05-17T00:37:37.650092250Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:37.650506 env[1418]: time="2025-05-17T00:37:37.650456955Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f pid=4835 runtime=io.containerd.runc.v2 May 17 00:37:37.693327 systemd[1]: Started cri-containerd-f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f.scope. May 17 00:37:37.732000 audit[4859]: NETFILTER_CFG table=filter:133 family=2 entries=65 op=nft_register_chain pid=4859 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:37.746819 kernel: audit: type=1325 audit(1747442257.732:1372): table=filter:133 family=2 entries=65 op=nft_register_chain pid=4859 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:37.732000 audit[4859]: SYSCALL arch=c000003e syscall=46 success=yes exit=30204 a0=3 a1=7fffb050b3e0 a2=0 a3=7fffb050b3cc items=0 ppid=3764 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:37.769819 kernel: audit: type=1300 audit(1747442257.732:1372): arch=c000003e syscall=46 success=yes exit=30204 a0=3 a1=7fffb050b3e0 a2=0 a3=7fffb050b3cc items=0 ppid=3764 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:37.732000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:37.786785 kernel: audit: type=1327 audit(1747442257.732:1372): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:37.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.807789 kernel: audit: type=1400 audit(1747442257.787:1373): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit: BPF prog-id=207 op=LOAD May 17 00:37:37.788000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[4847]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4835 pid=4847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:37.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637643033633337613663313933653734373036373337366630633435 May 17 00:37:37.788000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[4847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4835 pid=4847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:37.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637643033633337613663313933653734373036373337366630633435 May 17 00:37:37.788000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit: BPF prog-id=208 op=LOAD May 17 00:37:37.788000 audit[4847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003dc570 items=0 ppid=4835 pid=4847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:37.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637643033633337613663313933653734373036373337366630633435 May 17 00:37:37.788000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.788000 audit: BPF prog-id=209 op=LOAD May 17 00:37:37.788000 audit[4847]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003dc5b8 items=0 ppid=4835 pid=4847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:37.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637643033633337613663313933653734373036373337366630633435 May 17 00:37:37.789000 audit: BPF prog-id=209 op=UNLOAD May 17 00:37:37.789000 audit: BPF prog-id=208 op=UNLOAD May 17 00:37:37.789000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.789000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.789000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.789000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.789000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.789000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.789000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.789000 audit[4847]: AVC avc: denied { perfmon } for pid=4847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.789000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.789000 audit[4847]: AVC avc: denied { bpf } for pid=4847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:37.789000 audit: BPF prog-id=210 op=LOAD May 17 00:37:37.789000 audit[4847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003dc9c8 items=0 ppid=4835 pid=4847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:37.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637643033633337613663313933653734373036373337366630633435 May 17 00:37:37.863650 env[1418]: time="2025-05-17T00:37:37.863596119Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c994b7d8-hgp4q,Uid:a22d7efa-452f-4f58-901c-3556264cc279,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f\"" May 17 00:37:37.866750 env[1418]: time="2025-05-17T00:37:37.866708965Z" level=info msg="CreateContainer within sandbox \"f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:37:37.926967 env[1418]: time="2025-05-17T00:37:37.926909459Z" level=info msg="CreateContainer within sandbox \"f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"09c62a61bb70f84d61b0e767d54f7ddb403e1c28a2e52eec58b8271315e6e69b\"" May 17 00:37:37.927683 env[1418]: time="2025-05-17T00:37:37.927647970Z" level=info msg="StartContainer for \"09c62a61bb70f84d61b0e767d54f7ddb403e1c28a2e52eec58b8271315e6e69b\"" May 17 00:37:37.965632 systemd[1]: Started cri-containerd-09c62a61bb70f84d61b0e767d54f7ddb403e1c28a2e52eec58b8271315e6e69b.scope. May 17 00:37:38.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.017000 audit: BPF prog-id=211 op=LOAD May 17 00:37:38.024000 audit[4876]: AVC avc: denied { bpf } for pid=4876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4835 pid=4876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039633632613631626237306638346436316230653736376435346637 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { perfmon } for pid=4876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4835 pid=4876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039633632613631626237306638346436316230653736376435346637 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { bpf } for pid=4876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { bpf } for pid=4876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { bpf } for pid=4876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { perfmon } for pid=4876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { perfmon } for pid=4876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { perfmon } for pid=4876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { perfmon } for pid=4876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { perfmon } for pid=4876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { bpf } for pid=4876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { bpf } for pid=4876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit: BPF prog-id=212 op=LOAD May 17 00:37:38.024000 audit[4876]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000f5d00 items=0 ppid=4835 pid=4876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039633632613631626237306638346436316230653736376435346637 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { bpf } for pid=4876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { bpf } for pid=4876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { perfmon } for pid=4876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { perfmon } for pid=4876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { perfmon } for pid=4876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { perfmon } for pid=4876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { perfmon } for pid=4876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { bpf } for pid=4876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { bpf } for pid=4876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit: BPF prog-id=213 op=LOAD May 17 00:37:38.024000 audit[4876]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000f5d48 items=0 ppid=4835 pid=4876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039633632613631626237306638346436316230653736376435346637 May 17 00:37:38.024000 audit: BPF prog-id=213 op=UNLOAD May 17 00:37:38.024000 audit: BPF prog-id=212 op=UNLOAD May 17 00:37:38.024000 audit[4876]: AVC avc: denied { bpf } for pid=4876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { bpf } for pid=4876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { bpf } for pid=4876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { perfmon } for pid=4876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { perfmon } for pid=4876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { perfmon } for pid=4876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { perfmon } for pid=4876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { perfmon } for pid=4876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { bpf } for pid=4876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit[4876]: AVC avc: denied { bpf } for pid=4876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.024000 audit: BPF prog-id=214 op=LOAD May 17 00:37:38.024000 audit[4876]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000360158 items=0 ppid=4835 pid=4876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039633632613631626237306638346436316230653736376435346637 May 17 00:37:38.318132 env[1418]: time="2025-05-17T00:37:38.316655872Z" level=info msg="StartContainer for \"09c62a61bb70f84d61b0e767d54f7ddb403e1c28a2e52eec58b8271315e6e69b\" returns successfully" May 17 00:37:38.426145 kubelet[2411]: I0517 00:37:38.425180 2411 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:37:38.486000 audit[4903]: NETFILTER_CFG table=filter:134 family=2 entries=14 op=nft_register_rule pid=4903 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:38.486000 audit[4903]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe6c886c80 a2=0 a3=7ffe6c886c6c items=0 ppid=2515 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.486000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:38.490000 audit[4903]: NETFILTER_CFG table=nat:135 family=2 entries=20 op=nft_register_rule pid=4903 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:38.490000 audit[4903]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe6c886c80 a2=0 a3=7ffe6c886c6c items=0 ppid=2515 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.490000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:38.660000 audit[4710]: AVC avc: denied { watch } for pid=4710 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_37_19.3445032489/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c337,c372 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c337,c372 tclass=file permissive=0 May 17 00:37:38.660000 audit[4710]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001089700 a2=fc6 a3=0 items=0 ppid=4048 pid=4710 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c337,c372 key=(null) May 17 00:37:38.660000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:37:39.340909 systemd-networkd[1573]: cali4fd132d924c: Gained IPv6LL May 17 00:37:39.425692 kubelet[2411]: I0517 00:37:39.425652 2411 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:37:40.867727 env[1418]: time="2025-05-17T00:37:40.867644748Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:40.887565 env[1418]: time="2025-05-17T00:37:40.887514430Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:40.896531 env[1418]: time="2025-05-17T00:37:40.896482157Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:40.911287 env[1418]: time="2025-05-17T00:37:40.911237866Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:40.912513 env[1418]: time="2025-05-17T00:37:40.912468983Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\" returns image reference \"sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50\"" May 17 00:37:40.915261 env[1418]: time="2025-05-17T00:37:40.915231922Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:37:40.926378 env[1418]: time="2025-05-17T00:37:40.926331680Z" level=info msg="CreateContainer within sandbox \"bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 17 00:37:40.972292 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount538564100.mount: Deactivated successfully. May 17 00:37:40.991638 env[1418]: time="2025-05-17T00:37:40.991584205Z" level=info msg="CreateContainer within sandbox \"bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"c2e8bb3ef54ff49b0802ffa399482a08c1c08acd49405db0c8bedf8b54a3e235\"" May 17 00:37:40.992717 env[1418]: time="2025-05-17T00:37:40.992672720Z" level=info msg="StartContainer for \"c2e8bb3ef54ff49b0802ffa399482a08c1c08acd49405db0c8bedf8b54a3e235\"" May 17 00:37:41.024077 systemd[1]: Started cri-containerd-c2e8bb3ef54ff49b0802ffa399482a08c1c08acd49405db0c8bedf8b54a3e235.scope. May 17 00:37:41.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.058000 audit: BPF prog-id=215 op=LOAD May 17 00:37:41.059000 audit[4929]: AVC avc: denied { bpf } for pid=4929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.059000 audit[4929]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4319 pid=4929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:41.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332653862623365663534666634396230383032666661333939343832 May 17 00:37:41.059000 audit[4929]: AVC avc: denied { perfmon } for pid=4929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.059000 audit[4929]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4319 pid=4929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:41.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332653862623365663534666634396230383032666661333939343832 May 17 00:37:41.060000 audit[4929]: AVC avc: denied { bpf } for pid=4929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.060000 audit[4929]: AVC avc: denied { bpf } for pid=4929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.060000 audit[4929]: AVC avc: denied { bpf } for pid=4929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.060000 audit[4929]: AVC avc: denied { perfmon } for pid=4929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.060000 audit[4929]: AVC avc: denied { perfmon } for pid=4929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.060000 audit[4929]: AVC avc: denied { perfmon } for pid=4929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.060000 audit[4929]: AVC avc: denied { perfmon } for pid=4929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.060000 audit[4929]: AVC avc: denied { perfmon } for pid=4929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.060000 audit[4929]: AVC avc: denied { bpf } for pid=4929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.060000 audit[4929]: AVC avc: denied { bpf } for pid=4929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.060000 audit: BPF prog-id=216 op=LOAD May 17 00:37:41.060000 audit[4929]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000351cf0 items=0 ppid=4319 pid=4929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:41.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332653862623365663534666634396230383032666661333939343832 May 17 00:37:41.061000 audit[4929]: AVC avc: denied { bpf } for pid=4929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.061000 audit[4929]: AVC avc: denied { bpf } for pid=4929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.061000 audit[4929]: AVC avc: denied { perfmon } for pid=4929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.061000 audit[4929]: AVC avc: denied { perfmon } for pid=4929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.061000 audit[4929]: AVC avc: denied { perfmon } for pid=4929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.061000 audit[4929]: AVC avc: denied { perfmon } for pid=4929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.061000 audit[4929]: AVC avc: denied { perfmon } for pid=4929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.061000 audit[4929]: AVC avc: denied { bpf } for pid=4929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.061000 audit[4929]: AVC avc: denied { bpf } for pid=4929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.061000 audit: BPF prog-id=217 op=LOAD May 17 00:37:41.061000 audit[4929]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000351d38 items=0 ppid=4319 pid=4929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:41.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332653862623365663534666634396230383032666661333939343832 May 17 00:37:41.061000 audit: BPF prog-id=217 op=UNLOAD May 17 00:37:41.062000 audit: BPF prog-id=216 op=UNLOAD May 17 00:37:41.062000 audit[4929]: AVC avc: denied { bpf } for pid=4929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.062000 audit[4929]: AVC avc: denied { bpf } for pid=4929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.062000 audit[4929]: AVC avc: denied { bpf } for pid=4929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.062000 audit[4929]: AVC avc: denied { perfmon } for pid=4929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.062000 audit[4929]: AVC avc: denied { perfmon } for pid=4929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.062000 audit[4929]: AVC avc: denied { perfmon } for pid=4929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.062000 audit[4929]: AVC avc: denied { perfmon } for pid=4929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.062000 audit[4929]: AVC avc: denied { perfmon } for pid=4929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.062000 audit[4929]: AVC avc: denied { bpf } for pid=4929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.062000 audit[4929]: AVC avc: denied { bpf } for pid=4929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.062000 audit: BPF prog-id=218 op=LOAD May 17 00:37:41.062000 audit[4929]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c6148 items=0 ppid=4319 pid=4929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:41.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332653862623365663534666634396230383032666661333939343832 May 17 00:37:41.082000 audit[4755]: AVC avc: denied { watch } for pid=4755 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_37_19.3293374513/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c193,c552 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c193,c552 tclass=file permissive=0 May 17 00:37:41.082000 audit[4755]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0016f2600 a2=fc6 a3=0 items=0 ppid=4274 pid=4755 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c193,c552 key=(null) May 17 00:37:41.082000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:37:41.109222 env[1418]: time="2025-05-17T00:37:41.109168949Z" level=info msg="StartContainer for \"c2e8bb3ef54ff49b0802ffa399482a08c1c08acd49405db0c8bedf8b54a3e235\" returns successfully" May 17 00:37:41.115656 env[1418]: time="2025-05-17T00:37:41.115598339Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:37:41.119463 env[1418]: time="2025-05-17T00:37:41.119353991Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:37:41.122931 kubelet[2411]: E0517 00:37:41.122337 2411 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:37:41.122931 kubelet[2411]: E0517 00:37:41.122387 2411 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:37:41.122931 kubelet[2411]: E0517 00:37:41.122649 2411 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-jzznx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-shhph_calico-system(6c0070f8-dd11-4a02-a60b-d807c5fc3160): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:37:41.123807 env[1418]: time="2025-05-17T00:37:41.123775653Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:37:41.124087 kubelet[2411]: E0517 00:37:41.124031 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-shhph" podUID="6c0070f8-dd11-4a02-a60b-d807c5fc3160" May 17 00:37:41.133164 kubelet[2411]: I0517 00:37:41.132390 2411 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5c994b7d8-hgp4q" podStartSLOduration=39.132368473 podStartE2EDuration="39.132368473s" podCreationTimestamp="2025-05-17 00:37:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:37:38.443077319 +0000 UTC m=+53.095023129" watchObservedRunningTime="2025-05-17 00:37:41.132368473 +0000 UTC m=+55.784314183" May 17 00:37:41.167000 audit[4963]: NETFILTER_CFG table=filter:136 family=2 entries=13 op=nft_register_rule pid=4963 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:41.167000 audit[4963]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc06d37e20 a2=0 a3=7ffc06d37e0c items=0 ppid=2515 pid=4963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:41.167000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:41.175000 audit[4963]: NETFILTER_CFG table=nat:137 family=2 entries=27 op=nft_register_chain pid=4963 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:41.175000 audit[4963]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc06d37e20 a2=0 a3=7ffc06d37e0c items=0 ppid=2515 pid=4963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:41.175000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:41.190080 kubelet[2411]: I0517 00:37:41.189359 2411 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:37:41.190604 env[1418]: time="2025-05-17T00:37:41.190556986Z" level=info msg="StopContainer for \"5820f70ee46a34b6867dba0f7794708f9b023f1fe207e4dc56167a2ed269b4c1\" with timeout 30 (s)" May 17 00:37:41.191285 env[1418]: time="2025-05-17T00:37:41.191254495Z" level=info msg="Stop container \"5820f70ee46a34b6867dba0f7794708f9b023f1fe207e4dc56167a2ed269b4c1\" with signal terminated" May 17 00:37:41.241000 audit: BPF prog-id=199 op=UNLOAD May 17 00:37:41.242345 systemd[1]: cri-containerd-5820f70ee46a34b6867dba0f7794708f9b023f1fe207e4dc56167a2ed269b4c1.scope: Deactivated successfully. May 17 00:37:41.245000 audit: BPF prog-id=202 op=UNLOAD May 17 00:37:41.261000 audit[4971]: NETFILTER_CFG table=filter:138 family=2 entries=12 op=nft_register_rule pid=4971 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:41.261000 audit[4971]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc16792590 a2=0 a3=7ffc1679257c items=0 ppid=2515 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:41.261000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:41.276000 audit[4971]: NETFILTER_CFG table=nat:139 family=2 entries=30 op=nft_register_rule pid=4971 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:41.276000 audit[4971]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc16792590 a2=0 a3=7ffc1679257c items=0 ppid=2515 pid=4971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:41.276000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:41.288363 systemd[1]: Created slice kubepods-besteffort-pod71f745eb_7bcc_440c_bb92_5258ec526284.slice. May 17 00:37:41.399003 kubelet[2411]: I0517 00:37:41.398904 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/71f745eb-7bcc-440c-bb92-5258ec526284-calico-apiserver-certs\") pod \"calico-apiserver-7bd946bb48-54tkb\" (UID: \"71f745eb-7bcc-440c-bb92-5258ec526284\") " pod="calico-apiserver/calico-apiserver-7bd946bb48-54tkb" May 17 00:37:41.399438 kubelet[2411]: I0517 00:37:41.399408 2411 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2bd7p\" (UniqueName: \"kubernetes.io/projected/71f745eb-7bcc-440c-bb92-5258ec526284-kube-api-access-2bd7p\") pod \"calico-apiserver-7bd946bb48-54tkb\" (UID: \"71f745eb-7bcc-440c-bb92-5258ec526284\") " pod="calico-apiserver/calico-apiserver-7bd946bb48-54tkb" May 17 00:37:41.453330 kubelet[2411]: E0517 00:37:41.453282 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-shhph" podUID="6c0070f8-dd11-4a02-a60b-d807c5fc3160" May 17 00:37:41.528877 kubelet[2411]: I0517 00:37:41.528816 2411 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-85557d7668-6rdqn" podStartSLOduration=27.404062077 podStartE2EDuration="34.528788909s" podCreationTimestamp="2025-05-17 00:37:07 +0000 UTC" firstStartedPulling="2025-05-17 00:37:33.789221072 +0000 UTC m=+48.441166782" lastFinishedPulling="2025-05-17 00:37:40.913947904 +0000 UTC m=+55.565893614" observedRunningTime="2025-05-17 00:37:41.50738061 +0000 UTC m=+56.159326320" watchObservedRunningTime="2025-05-17 00:37:41.528788909 +0000 UTC m=+56.180734619" May 17 00:37:41.579000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:41.580000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:41.580000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002344d50 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:37:41.580000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:41.579000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a587e0 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:37:41.579000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:41.595336 env[1418]: time="2025-05-17T00:37:41.595288738Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bd946bb48-54tkb,Uid:71f745eb-7bcc-440c-bb92-5258ec526284,Namespace:calico-apiserver,Attempt:0,}" May 17 00:37:41.698000 audit[4888]: AVC avc: denied { watch } for pid=4888 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_37_19.1215927753/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c468,c751 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c468,c751 tclass=file permissive=0 May 17 00:37:41.698000 audit[4888]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ae02e0 a2=fc6 a3=0 items=0 ppid=4835 pid=4888 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c468,c751 key=(null) May 17 00:37:41.698000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:37:41.924326 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5820f70ee46a34b6867dba0f7794708f9b023f1fe207e4dc56167a2ed269b4c1-rootfs.mount: Deactivated successfully. May 17 00:37:42.317000 audit[5011]: NETFILTER_CFG table=filter:140 family=2 entries=12 op=nft_register_rule pid=5011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:42.576998 kernel: kauditd_printk_skb: 223 callbacks suppressed May 17 00:37:42.577118 kernel: audit: type=1400 audit(1747442262.547:1447): avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:42.577158 kernel: audit: type=1400 audit(1747442262.547:1446): avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:42.317000 audit[5011]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe47921d20 a2=0 a3=7ffe47921d0c items=0 ppid=2515 pid=5011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:42.317000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:42.323000 audit[5011]: NETFILTER_CFG table=nat:141 family=2 entries=34 op=nft_register_chain pid=5011 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:42.323000 audit[5011]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffe47921d20 a2=0 a3=7ffe47921d0c items=0 ppid=2515 pid=5011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:42.323000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:42.483000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:42.483000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00b22b260 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:37:42.483000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:37:42.504000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:42.504000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00f080ea0 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:37:42.504000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:37:42.504000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:42.504000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00b22b2c0 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:37:42.504000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:37:42.506000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:42.506000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00b22b3b0 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:37:42.506000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:37:42.547000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:42.547000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:42.473161 systemd[1]: run-containerd-runc-k8s.io-c2e8bb3ef54ff49b0802ffa399482a08c1c08acd49405db0c8bedf8b54a3e235-runc.XNapuf.mount: Deactivated successfully. May 17 00:37:42.547000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00ad43170 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:37:42.606841 kernel: audit: type=1300 audit(1747442262.547:1447): arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00ad43170 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:37:42.547000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:37:42.624393 kernel: audit: type=1327 audit(1747442262.547:1447): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:37:42.624524 kernel: audit: type=1300 audit(1747442262.547:1446): arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00f080ee0 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:37:42.547000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00f080ee0 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:37:42.547000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:37:42.657997 kernel: audit: type=1327 audit(1747442262.547:1446): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:37:46.041396 env[1418]: time="2025-05-17T00:37:46.041338528Z" level=info msg="shim disconnected" id=5820f70ee46a34b6867dba0f7794708f9b023f1fe207e4dc56167a2ed269b4c1 May 17 00:37:46.041914 env[1418]: time="2025-05-17T00:37:46.041877235Z" level=warning msg="cleaning up after shim disconnected" id=5820f70ee46a34b6867dba0f7794708f9b023f1fe207e4dc56167a2ed269b4c1 namespace=k8s.io May 17 00:37:46.041914 env[1418]: time="2025-05-17T00:37:46.041906935Z" level=info msg="cleaning up dead shim" May 17 00:37:46.050915 env[1418]: time="2025-05-17T00:37:46.050871752Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:37:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5052 runtime=io.containerd.runc.v2\n" May 17 00:37:46.056138 env[1418]: time="2025-05-17T00:37:46.056102220Z" level=info msg="StopContainer for \"5820f70ee46a34b6867dba0f7794708f9b023f1fe207e4dc56167a2ed269b4c1\" returns successfully" May 17 00:37:46.056692 env[1418]: time="2025-05-17T00:37:46.056661627Z" level=info msg="StopPodSandbox for \"daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28\"" May 17 00:37:46.056822 env[1418]: time="2025-05-17T00:37:46.056729728Z" level=info msg="Container to stop \"5820f70ee46a34b6867dba0f7794708f9b023f1fe207e4dc56167a2ed269b4c1\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 17 00:37:46.061004 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28-shm.mount: Deactivated successfully. May 17 00:37:46.064210 env[1418]: time="2025-05-17T00:37:46.064180825Z" level=info msg="StopPodSandbox for \"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\"" May 17 00:37:46.071592 systemd[1]: cri-containerd-daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28.scope: Deactivated successfully. May 17 00:37:46.071000 audit: BPF prog-id=163 op=UNLOAD May 17 00:37:46.077834 kernel: audit: type=1334 audit(1747442266.071:1448): prog-id=163 op=UNLOAD May 17 00:37:46.078000 audit: BPF prog-id=166 op=UNLOAD May 17 00:37:46.086775 kernel: audit: type=1334 audit(1747442266.078:1449): prog-id=166 op=UNLOAD May 17 00:37:46.160812 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28-rootfs.mount: Deactivated successfully. May 17 00:37:46.189175 env[1418]: time="2025-05-17T00:37:46.189113951Z" level=info msg="shim disconnected" id=daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28 May 17 00:37:46.190885 env[1418]: time="2025-05-17T00:37:46.190824773Z" level=warning msg="cleaning up after shim disconnected" id=daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28 namespace=k8s.io May 17 00:37:46.191062 env[1418]: time="2025-05-17T00:37:46.191041476Z" level=info msg="cleaning up dead shim" May 17 00:37:46.241751 env[1418]: time="2025-05-17T00:37:46.241704235Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:37:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5113 runtime=io.containerd.runc.v2\n" May 17 00:37:46.247200 env[1418]: 2025-05-17 00:37:46.180 [WARNING][5081] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0", GenerateName:"calico-apiserver-7bd946bb48-", Namespace:"calico-apiserver", SelfLink:"", UID:"c05e338a-4f12-40a1-8a27-51112ea43071", ResourceVersion:"1047", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bd946bb48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828", Pod:"calico-apiserver-7bd946bb48-2lg62", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1bdb5a298da", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:46.247200 env[1418]: 2025-05-17 00:37:46.182 [INFO][5081] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" May 17 00:37:46.247200 env[1418]: 2025-05-17 00:37:46.182 [INFO][5081] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" iface="eth0" netns="" May 17 00:37:46.247200 env[1418]: 2025-05-17 00:37:46.182 [INFO][5081] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" May 17 00:37:46.247200 env[1418]: 2025-05-17 00:37:46.182 [INFO][5081] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" May 17 00:37:46.247200 env[1418]: 2025-05-17 00:37:46.233 [INFO][5114] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" HandleID="k8s-pod-network.f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0" May 17 00:37:46.247200 env[1418]: 2025-05-17 00:37:46.233 [INFO][5114] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:46.247200 env[1418]: 2025-05-17 00:37:46.233 [INFO][5114] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:46.247200 env[1418]: 2025-05-17 00:37:46.241 [WARNING][5114] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" HandleID="k8s-pod-network.f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0" May 17 00:37:46.247200 env[1418]: 2025-05-17 00:37:46.241 [INFO][5114] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" HandleID="k8s-pod-network.f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0" May 17 00:37:46.247200 env[1418]: 2025-05-17 00:37:46.243 [INFO][5114] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:46.247200 env[1418]: 2025-05-17 00:37:46.246 [INFO][5081] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" May 17 00:37:46.247940 env[1418]: time="2025-05-17T00:37:46.247242008Z" level=info msg="TearDown network for sandbox \"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\" successfully" May 17 00:37:46.247940 env[1418]: time="2025-05-17T00:37:46.247276008Z" level=info msg="StopPodSandbox for \"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\" returns successfully" May 17 00:37:46.248939 env[1418]: time="2025-05-17T00:37:46.248896229Z" level=info msg="RemovePodSandbox for \"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\"" May 17 00:37:46.249977 env[1418]: time="2025-05-17T00:37:46.249039831Z" level=info msg="Forcibly stopping sandbox \"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\"" May 17 00:37:46.342866 systemd-networkd[1573]: cali8d975e43539: Link DOWN May 17 00:37:46.342874 systemd-networkd[1573]: cali8d975e43539: Lost carrier May 17 00:37:46.417286 systemd-networkd[1573]: cali96972d16ba0: Link UP May 17 00:37:46.425871 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali96972d16ba0: link becomes ready May 17 00:37:46.431366 systemd-networkd[1573]: cali96972d16ba0: Gained carrier May 17 00:37:46.430000 audit[5183]: NETFILTER_CFG table=filter:142 family=2 entries=63 op=nft_register_rule pid=5183 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:46.443868 kernel: audit: type=1325 audit(1747442266.430:1450): table=filter:142 family=2 entries=63 op=nft_register_rule pid=5183 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:46.430000 audit[5183]: SYSCALL arch=c000003e syscall=46 success=yes exit=11336 a0=3 a1=7ffd5c04e8e0 a2=0 a3=7ffd5c04e8cc items=0 ppid=3764 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:46.469186 kernel: audit: type=1300 audit(1747442266.430:1450): arch=c000003e syscall=46 success=yes exit=11336 a0=3 a1=7ffd5c04e8e0 a2=0 a3=7ffd5c04e8cc items=0 ppid=3764 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:46.469310 kubelet[2411]: I0517 00:37:46.454881 2411 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" May 17 00:37:46.484132 env[1418]: 2025-05-17 00:37:46.232 [INFO][5099] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--54tkb-eth0 calico-apiserver-7bd946bb48- calico-apiserver 71f745eb-7bcc-440c-bb92-5258ec526284 1076 0 2025-05-17 00:37:41 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7bd946bb48 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-cef16a74b5 calico-apiserver-7bd946bb48-54tkb eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali96972d16ba0 [] [] }} ContainerID="b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a" Namespace="calico-apiserver" Pod="calico-apiserver-7bd946bb48-54tkb" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--54tkb-" May 17 00:37:46.484132 env[1418]: 2025-05-17 00:37:46.232 [INFO][5099] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a" Namespace="calico-apiserver" Pod="calico-apiserver-7bd946bb48-54tkb" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--54tkb-eth0" May 17 00:37:46.484132 env[1418]: 2025-05-17 00:37:46.316 [INFO][5134] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a" HandleID="k8s-pod-network.b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--54tkb-eth0" May 17 00:37:46.484132 env[1418]: 2025-05-17 00:37:46.316 [INFO][5134] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a" HandleID="k8s-pod-network.b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--54tkb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000235110), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-cef16a74b5", "pod":"calico-apiserver-7bd946bb48-54tkb", "timestamp":"2025-05-17 00:37:46.316510909 +0000 UTC"}, Hostname:"ci-3510.3.7-n-cef16a74b5", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:37:46.484132 env[1418]: 2025-05-17 00:37:46.317 [INFO][5134] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:46.484132 env[1418]: 2025-05-17 00:37:46.317 [INFO][5134] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:46.484132 env[1418]: 2025-05-17 00:37:46.321 [INFO][5134] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-cef16a74b5' May 17 00:37:46.484132 env[1418]: 2025-05-17 00:37:46.333 [INFO][5134] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:46.484132 env[1418]: 2025-05-17 00:37:46.350 [INFO][5134] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:46.484132 env[1418]: 2025-05-17 00:37:46.359 [INFO][5134] ipam/ipam.go 511: Trying affinity for 192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:46.484132 env[1418]: 2025-05-17 00:37:46.364 [INFO][5134] ipam/ipam.go 158: Attempting to load block cidr=192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:46.484132 env[1418]: 2025-05-17 00:37:46.367 [INFO][5134] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.34.192/26 host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:46.484132 env[1418]: 2025-05-17 00:37:46.367 [INFO][5134] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.34.192/26 handle="k8s-pod-network.b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:46.484132 env[1418]: 2025-05-17 00:37:46.369 [INFO][5134] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a May 17 00:37:46.484132 env[1418]: 2025-05-17 00:37:46.388 [INFO][5134] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.34.192/26 handle="k8s-pod-network.b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:46.484132 env[1418]: 2025-05-17 00:37:46.408 [INFO][5134] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.34.202/26] block=192.168.34.192/26 handle="k8s-pod-network.b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:46.484132 env[1418]: 2025-05-17 00:37:46.408 [INFO][5134] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.34.202/26] handle="k8s-pod-network.b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a" host="ci-3510.3.7-n-cef16a74b5" May 17 00:37:46.484132 env[1418]: 2025-05-17 00:37:46.408 [INFO][5134] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:46.484132 env[1418]: 2025-05-17 00:37:46.408 [INFO][5134] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.202/26] IPv6=[] ContainerID="b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a" HandleID="k8s-pod-network.b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--54tkb-eth0" May 17 00:37:46.485107 env[1418]: 2025-05-17 00:37:46.410 [INFO][5099] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a" Namespace="calico-apiserver" Pod="calico-apiserver-7bd946bb48-54tkb" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--54tkb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--54tkb-eth0", GenerateName:"calico-apiserver-7bd946bb48-", Namespace:"calico-apiserver", SelfLink:"", UID:"71f745eb-7bcc-440c-bb92-5258ec526284", ResourceVersion:"1076", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bd946bb48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"", Pod:"calico-apiserver-7bd946bb48-54tkb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.202/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali96972d16ba0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:46.485107 env[1418]: 2025-05-17 00:37:46.410 [INFO][5099] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.34.202/32] ContainerID="b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a" Namespace="calico-apiserver" Pod="calico-apiserver-7bd946bb48-54tkb" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--54tkb-eth0" May 17 00:37:46.485107 env[1418]: 2025-05-17 00:37:46.410 [INFO][5099] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali96972d16ba0 ContainerID="b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a" Namespace="calico-apiserver" Pod="calico-apiserver-7bd946bb48-54tkb" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--54tkb-eth0" May 17 00:37:46.485107 env[1418]: 2025-05-17 00:37:46.433 [INFO][5099] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a" Namespace="calico-apiserver" Pod="calico-apiserver-7bd946bb48-54tkb" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--54tkb-eth0" May 17 00:37:46.485107 env[1418]: 2025-05-17 00:37:46.443 [INFO][5099] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a" Namespace="calico-apiserver" Pod="calico-apiserver-7bd946bb48-54tkb" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--54tkb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--54tkb-eth0", GenerateName:"calico-apiserver-7bd946bb48-", Namespace:"calico-apiserver", SelfLink:"", UID:"71f745eb-7bcc-440c-bb92-5258ec526284", ResourceVersion:"1076", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bd946bb48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a", Pod:"calico-apiserver-7bd946bb48-54tkb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.202/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali96972d16ba0", MAC:"92:15:51:bc:49:a0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:46.485107 env[1418]: 2025-05-17 00:37:46.482 [INFO][5099] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a" Namespace="calico-apiserver" Pod="calico-apiserver-7bd946bb48-54tkb" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--54tkb-eth0" May 17 00:37:46.430000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:46.432000 audit[5183]: NETFILTER_CFG table=filter:143 family=2 entries=2 op=nft_unregister_chain pid=5183 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:46.432000 audit[5183]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd5c04e8e0 a2=0 a3=5653fc9d1000 items=0 ppid=3764 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:46.432000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:46.565533 env[1418]: time="2025-05-17T00:37:46.558035052Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:46.565533 env[1418]: time="2025-05-17T00:37:46.558150154Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:46.565533 env[1418]: time="2025-05-17T00:37:46.558188454Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:46.565533 env[1418]: time="2025-05-17T00:37:46.558364156Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a pid=5203 runtime=io.containerd.runc.v2 May 17 00:37:46.612580 systemd[1]: Started cri-containerd-b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a.scope. May 17 00:37:46.678973 env[1418]: 2025-05-17 00:37:46.341 [INFO][5154] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" May 17 00:37:46.678973 env[1418]: 2025-05-17 00:37:46.342 [INFO][5154] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" iface="eth0" netns="/var/run/netns/cni-b38d507d-cacd-11f3-4811-aa0e844f15b9" May 17 00:37:46.678973 env[1418]: 2025-05-17 00:37:46.342 [INFO][5154] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" iface="eth0" netns="/var/run/netns/cni-b38d507d-cacd-11f3-4811-aa0e844f15b9" May 17 00:37:46.678973 env[1418]: 2025-05-17 00:37:46.368 [INFO][5154] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" after=26.624246ms iface="eth0" netns="/var/run/netns/cni-b38d507d-cacd-11f3-4811-aa0e844f15b9" May 17 00:37:46.678973 env[1418]: 2025-05-17 00:37:46.374 [INFO][5154] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" May 17 00:37:46.678973 env[1418]: 2025-05-17 00:37:46.374 [INFO][5154] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" May 17 00:37:46.678973 env[1418]: 2025-05-17 00:37:46.541 [INFO][5172] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" HandleID="k8s-pod-network.daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:46.678973 env[1418]: 2025-05-17 00:37:46.541 [INFO][5172] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:46.678973 env[1418]: 2025-05-17 00:37:46.541 [INFO][5172] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:46.678973 env[1418]: 2025-05-17 00:37:46.665 [INFO][5172] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" HandleID="k8s-pod-network.daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:46.678973 env[1418]: 2025-05-17 00:37:46.665 [INFO][5172] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" HandleID="k8s-pod-network.daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:46.678973 env[1418]: 2025-05-17 00:37:46.673 [INFO][5172] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:46.678973 env[1418]: 2025-05-17 00:37:46.675 [INFO][5154] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" May 17 00:37:46.692842 env[1418]: 2025-05-17 00:37:46.422 [WARNING][5159] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0", GenerateName:"calico-apiserver-7bd946bb48-", Namespace:"calico-apiserver", SelfLink:"", UID:"c05e338a-4f12-40a1-8a27-51112ea43071", ResourceVersion:"1047", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7bd946bb48", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"43198c4a8800a811088a926a7fc567eb25f29b4dd1aedb27473ecab09b08b828", Pod:"calico-apiserver-7bd946bb48-2lg62", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1bdb5a298da", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:46.692842 env[1418]: 2025-05-17 00:37:46.426 [INFO][5159] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" May 17 00:37:46.692842 env[1418]: 2025-05-17 00:37:46.426 [INFO][5159] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" iface="eth0" netns="" May 17 00:37:46.692842 env[1418]: 2025-05-17 00:37:46.426 [INFO][5159] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" May 17 00:37:46.692842 env[1418]: 2025-05-17 00:37:46.426 [INFO][5159] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" May 17 00:37:46.692842 env[1418]: 2025-05-17 00:37:46.548 [INFO][5187] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" HandleID="k8s-pod-network.f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0" May 17 00:37:46.692842 env[1418]: 2025-05-17 00:37:46.548 [INFO][5187] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:46.692842 env[1418]: 2025-05-17 00:37:46.673 [INFO][5187] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:46.692842 env[1418]: 2025-05-17 00:37:46.685 [WARNING][5187] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" HandleID="k8s-pod-network.f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0" May 17 00:37:46.692842 env[1418]: 2025-05-17 00:37:46.685 [INFO][5187] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" HandleID="k8s-pod-network.f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--7bd946bb48--2lg62-eth0" May 17 00:37:46.692842 env[1418]: 2025-05-17 00:37:46.687 [INFO][5187] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:46.692842 env[1418]: 2025-05-17 00:37:46.688 [INFO][5159] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451" May 17 00:37:46.693640 env[1418]: time="2025-05-17T00:37:46.693600116Z" level=info msg="TearDown network for sandbox \"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\" successfully" May 17 00:37:46.699051 env[1418]: time="2025-05-17T00:37:46.699004187Z" level=info msg="TearDown network for sandbox \"daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28\" successfully" May 17 00:37:46.699296 env[1418]: time="2025-05-17T00:37:46.699265790Z" level=info msg="StopPodSandbox for \"daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28\" returns successfully" May 17 00:37:46.699957 env[1418]: time="2025-05-17T00:37:46.699928099Z" level=info msg="StopPodSandbox for \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\"" May 17 00:37:46.738000 audit[5248]: NETFILTER_CFG table=filter:144 family=2 entries=65 op=nft_register_chain pid=5248 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:46.738000 audit[5248]: SYSCALL arch=c000003e syscall=46 success=yes exit=30204 a0=3 a1=7ffc1915fde0 a2=0 a3=7ffc1915fdcc items=0 ppid=3764 pid=5248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:46.738000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:46.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.746000 audit: BPF prog-id=219 op=LOAD May 17 00:37:46.746000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.746000 audit[5216]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5203 pid=5216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:46.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237626137623861333533333338323334356264613864353730646331 May 17 00:37:46.746000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.746000 audit[5216]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5203 pid=5216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:46.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237626137623861333533333338323334356264613864353730646331 May 17 00:37:46.747000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.747000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.747000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.747000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.747000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.747000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.747000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.747000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.747000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.747000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.747000 audit: BPF prog-id=220 op=LOAD May 17 00:37:46.747000 audit[5216]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00020a670 items=0 ppid=5203 pid=5216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:46.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237626137623861333533333338323334356264613864353730646331 May 17 00:37:46.747000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.747000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.747000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.747000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.747000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.747000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.747000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.747000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.747000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.747000 audit: BPF prog-id=221 op=LOAD May 17 00:37:46.747000 audit[5216]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00020a6b8 items=0 ppid=5203 pid=5216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:46.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237626137623861333533333338323334356264613864353730646331 May 17 00:37:46.749000 audit: BPF prog-id=221 op=UNLOAD May 17 00:37:46.749000 audit: BPF prog-id=220 op=UNLOAD May 17 00:37:46.749000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.749000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.749000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.749000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.749000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.749000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.749000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.749000 audit[5216]: AVC avc: denied { perfmon } for pid=5216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.749000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.749000 audit[5216]: AVC avc: denied { bpf } for pid=5216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.749000 audit: BPF prog-id=222 op=LOAD May 17 00:37:46.752126 env[1418]: time="2025-05-17T00:37:46.752079977Z" level=info msg="RemovePodSandbox \"f070170f83e4df88d5d4961705c05da51ef029cee8840a62c96b89afb83a2451\" returns successfully" May 17 00:37:46.749000 audit[5216]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00020aac8 items=0 ppid=5203 pid=5216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:46.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237626137623861333533333338323334356264613864353730646331 May 17 00:37:46.754121 env[1418]: time="2025-05-17T00:37:46.753538596Z" level=info msg="StopPodSandbox for \"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\"" May 17 00:37:46.818039 env[1418]: time="2025-05-17T00:37:46.817991435Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7bd946bb48-54tkb,Uid:71f745eb-7bcc-440c-bb92-5258ec526284,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a\"" May 17 00:37:46.823582 env[1418]: time="2025-05-17T00:37:46.823540707Z" level=info msg="CreateContainer within sandbox \"b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:37:46.868029 env[1418]: time="2025-05-17T00:37:46.867904785Z" level=info msg="CreateContainer within sandbox \"b7ba7b8a3533382345bda8d570dc17ad7a8effa56465f47f69d511c02f93aa9a\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"46b0e0b3bdbc74e29571a6b7397b135a48d225805e8e4f4a8ec8d9fa0e3358c6\"" May 17 00:37:46.872023 env[1418]: time="2025-05-17T00:37:46.871984238Z" level=info msg="StartContainer for \"46b0e0b3bdbc74e29571a6b7397b135a48d225805e8e4f4a8ec8d9fa0e3358c6\"" May 17 00:37:46.891984 env[1418]: 2025-05-17 00:37:46.766 [WARNING][5235] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0", GenerateName:"calico-apiserver-5c994b7d8-", Namespace:"calico-apiserver", SelfLink:"", UID:"cf614254-62a7-4620-98f1-308d50209507", ResourceVersion:"1112", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c994b7d8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28", Pod:"calico-apiserver-5c994b7d8-c8j4r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8d975e43539", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:46.891984 env[1418]: 2025-05-17 00:37:46.766 [INFO][5235] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" May 17 00:37:46.891984 env[1418]: 2025-05-17 00:37:46.766 [INFO][5235] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" iface="eth0" netns="" May 17 00:37:46.891984 env[1418]: 2025-05-17 00:37:46.766 [INFO][5235] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" May 17 00:37:46.891984 env[1418]: 2025-05-17 00:37:46.766 [INFO][5235] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" May 17 00:37:46.891984 env[1418]: 2025-05-17 00:37:46.854 [INFO][5264] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" HandleID="k8s-pod-network.84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:46.891984 env[1418]: 2025-05-17 00:37:46.856 [INFO][5264] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:46.891984 env[1418]: 2025-05-17 00:37:46.856 [INFO][5264] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:46.891984 env[1418]: 2025-05-17 00:37:46.864 [WARNING][5264] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" HandleID="k8s-pod-network.84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:46.891984 env[1418]: 2025-05-17 00:37:46.866 [INFO][5264] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" HandleID="k8s-pod-network.84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:46.891984 env[1418]: 2025-05-17 00:37:46.877 [INFO][5264] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:46.891984 env[1418]: 2025-05-17 00:37:46.879 [INFO][5235] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" May 17 00:37:46.892800 env[1418]: time="2025-05-17T00:37:46.892007298Z" level=info msg="TearDown network for sandbox \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\" successfully" May 17 00:37:46.892800 env[1418]: time="2025-05-17T00:37:46.892041799Z" level=info msg="StopPodSandbox for \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\" returns successfully" May 17 00:37:46.935241 kubelet[2411]: I0517 00:37:46.935200 2411 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-h9t8g\" (UniqueName: \"kubernetes.io/projected/cf614254-62a7-4620-98f1-308d50209507-kube-api-access-h9t8g\") pod \"cf614254-62a7-4620-98f1-308d50209507\" (UID: \"cf614254-62a7-4620-98f1-308d50209507\") " May 17 00:37:46.935241 kubelet[2411]: I0517 00:37:46.935248 2411 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/cf614254-62a7-4620-98f1-308d50209507-calico-apiserver-certs\") pod \"cf614254-62a7-4620-98f1-308d50209507\" (UID: \"cf614254-62a7-4620-98f1-308d50209507\") " May 17 00:37:46.942305 kubelet[2411]: I0517 00:37:46.942261 2411 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/cf614254-62a7-4620-98f1-308d50209507-kube-api-access-h9t8g" (OuterVolumeSpecName: "kube-api-access-h9t8g") pod "cf614254-62a7-4620-98f1-308d50209507" (UID: "cf614254-62a7-4620-98f1-308d50209507"). InnerVolumeSpecName "kube-api-access-h9t8g". PluginName "kubernetes.io/projected", VolumeGidValue "" May 17 00:37:46.942481 kubelet[2411]: I0517 00:37:46.942371 2411 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/cf614254-62a7-4620-98f1-308d50209507-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "cf614254-62a7-4620-98f1-308d50209507" (UID: "cf614254-62a7-4620-98f1-308d50209507"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 17 00:37:46.960510 systemd[1]: Started cri-containerd-46b0e0b3bdbc74e29571a6b7397b135a48d225805e8e4f4a8ec8d9fa0e3358c6.scope. May 17 00:37:46.978000 audit[5312]: NETFILTER_CFG table=filter:145 family=2 entries=12 op=nft_register_rule pid=5312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:46.978000 audit[5312]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc65b195e0 a2=0 a3=7ffc65b195cc items=0 ppid=2515 pid=5312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:46.978000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:46.980031 env[1418]: 2025-05-17 00:37:46.840 [WARNING][5259] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0", GenerateName:"calico-apiserver-5c994b7d8-", Namespace:"calico-apiserver", SelfLink:"", UID:"a22d7efa-452f-4f58-901c-3556264cc279", ResourceVersion:"1088", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c994b7d8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f", Pod:"calico-apiserver-5c994b7d8-hgp4q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.201/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4fd132d924c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:46.980031 env[1418]: 2025-05-17 00:37:46.841 [INFO][5259] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" May 17 00:37:46.980031 env[1418]: 2025-05-17 00:37:46.841 [INFO][5259] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" iface="eth0" netns="" May 17 00:37:46.980031 env[1418]: 2025-05-17 00:37:46.841 [INFO][5259] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" May 17 00:37:46.980031 env[1418]: 2025-05-17 00:37:46.841 [INFO][5259] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" May 17 00:37:46.980031 env[1418]: 2025-05-17 00:37:46.950 [INFO][5282] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" HandleID="k8s-pod-network.382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:37:46.980031 env[1418]: 2025-05-17 00:37:46.950 [INFO][5282] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:46.980031 env[1418]: 2025-05-17 00:37:46.950 [INFO][5282] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:46.980031 env[1418]: 2025-05-17 00:37:46.967 [WARNING][5282] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" HandleID="k8s-pod-network.382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:37:46.980031 env[1418]: 2025-05-17 00:37:46.967 [INFO][5282] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" HandleID="k8s-pod-network.382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:37:46.980031 env[1418]: 2025-05-17 00:37:46.972 [INFO][5282] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:46.980031 env[1418]: 2025-05-17 00:37:46.974 [INFO][5259] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" May 17 00:37:46.980631 env[1418]: time="2025-05-17T00:37:46.980075945Z" level=info msg="TearDown network for sandbox \"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\" successfully" May 17 00:37:46.980631 env[1418]: time="2025-05-17T00:37:46.980116245Z" level=info msg="StopPodSandbox for \"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\" returns successfully" May 17 00:37:46.980906 env[1418]: time="2025-05-17T00:37:46.980878955Z" level=info msg="RemovePodSandbox for \"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\"" May 17 00:37:46.981045 env[1418]: time="2025-05-17T00:37:46.981002157Z" level=info msg="Forcibly stopping sandbox \"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\"" May 17 00:37:46.983000 audit[5312]: NETFILTER_CFG table=nat:146 family=2 entries=36 op=nft_register_rule pid=5312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:46.983000 audit[5312]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc65b195e0 a2=0 a3=7ffc65b195cc items=0 ppid=2515 pid=5312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:46.983000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:46.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:46.999000 audit: BPF prog-id=223 op=LOAD May 17 00:37:47.000000 audit[5294]: AVC avc: denied { bpf } for pid=5294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.000000 audit[5294]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5203 pid=5294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:47.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436623065306233626462633734653239353731613662373339376231 May 17 00:37:47.000000 audit[5294]: AVC avc: denied { perfmon } for pid=5294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.000000 audit[5294]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5203 pid=5294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:47.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436623065306233626462633734653239353731613662373339376231 May 17 00:37:47.001000 audit[5294]: AVC avc: denied { bpf } for pid=5294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.001000 audit[5294]: AVC avc: denied { bpf } for pid=5294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.001000 audit[5294]: AVC avc: denied { bpf } for pid=5294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.001000 audit[5294]: AVC avc: denied { perfmon } for pid=5294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.001000 audit[5294]: AVC avc: denied { perfmon } for pid=5294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.001000 audit[5294]: AVC avc: denied { perfmon } for pid=5294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.001000 audit[5294]: AVC avc: denied { perfmon } for pid=5294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.001000 audit[5294]: AVC avc: denied { perfmon } for pid=5294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.001000 audit[5294]: AVC avc: denied { bpf } for pid=5294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.001000 audit[5294]: AVC avc: denied { bpf } for pid=5294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.001000 audit: BPF prog-id=224 op=LOAD May 17 00:37:47.001000 audit[5294]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ca880 items=0 ppid=5203 pid=5294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:47.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436623065306233626462633734653239353731613662373339376231 May 17 00:37:47.002000 audit[5294]: AVC avc: denied { bpf } for pid=5294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.002000 audit[5294]: AVC avc: denied { bpf } for pid=5294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.002000 audit[5294]: AVC avc: denied { perfmon } for pid=5294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.002000 audit[5294]: AVC avc: denied { perfmon } for pid=5294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.002000 audit[5294]: AVC avc: denied { perfmon } for pid=5294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.002000 audit[5294]: AVC avc: denied { perfmon } for pid=5294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.002000 audit[5294]: AVC avc: denied { perfmon } for pid=5294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.002000 audit[5294]: AVC avc: denied { bpf } for pid=5294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.002000 audit[5294]: AVC avc: denied { bpf } for pid=5294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.002000 audit: BPF prog-id=225 op=LOAD May 17 00:37:47.002000 audit[5294]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ca8c8 items=0 ppid=5203 pid=5294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:47.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436623065306233626462633734653239353731613662373339376231 May 17 00:37:47.003000 audit: BPF prog-id=225 op=UNLOAD May 17 00:37:47.003000 audit: BPF prog-id=224 op=UNLOAD May 17 00:37:47.003000 audit[5294]: AVC avc: denied { bpf } for pid=5294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.003000 audit[5294]: AVC avc: denied { bpf } for pid=5294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.003000 audit[5294]: AVC avc: denied { bpf } for pid=5294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.003000 audit[5294]: AVC avc: denied { perfmon } for pid=5294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.003000 audit[5294]: AVC avc: denied { perfmon } for pid=5294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.003000 audit[5294]: AVC avc: denied { perfmon } for pid=5294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.003000 audit[5294]: AVC avc: denied { perfmon } for pid=5294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.003000 audit[5294]: AVC avc: denied { perfmon } for pid=5294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.003000 audit[5294]: AVC avc: denied { bpf } for pid=5294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.003000 audit[5294]: AVC avc: denied { bpf } for pid=5294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.003000 audit: BPF prog-id=226 op=LOAD May 17 00:37:47.003000 audit[5294]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003cacd8 items=0 ppid=5203 pid=5294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:47.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436623065306233626462633734653239353731613662373339376231 May 17 00:37:47.036098 kubelet[2411]: I0517 00:37:47.036030 2411 reconciler_common.go:293] "Volume detached for volume \"kube-api-access-h9t8g\" (UniqueName: \"kubernetes.io/projected/cf614254-62a7-4620-98f1-308d50209507-kube-api-access-h9t8g\") on node \"ci-3510.3.7-n-cef16a74b5\" DevicePath \"\"" May 17 00:37:47.036098 kubelet[2411]: I0517 00:37:47.036069 2411 reconciler_common.go:293] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/cf614254-62a7-4620-98f1-308d50209507-calico-apiserver-certs\") on node \"ci-3510.3.7-n-cef16a74b5\" DevicePath \"\"" May 17 00:37:47.064360 systemd[1]: run-netns-cni\x2db38d507d\x2dcacd\x2d11f3\x2d4811\x2daa0e844f15b9.mount: Deactivated successfully. May 17 00:37:47.064466 systemd[1]: var-lib-kubelet-pods-cf614254\x2d62a7\x2d4620\x2d98f1\x2d308d50209507-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dh9t8g.mount: Deactivated successfully. May 17 00:37:47.064544 systemd[1]: var-lib-kubelet-pods-cf614254\x2d62a7\x2d4620\x2d98f1\x2d308d50209507-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 17 00:37:47.070569 env[1418]: time="2025-05-17T00:37:47.070489909Z" level=info msg="StartContainer for \"46b0e0b3bdbc74e29571a6b7397b135a48d225805e8e4f4a8ec8d9fa0e3358c6\" returns successfully" May 17 00:37:47.186451 env[1418]: 2025-05-17 00:37:47.089 [WARNING][5324] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0", GenerateName:"calico-apiserver-5c994b7d8-", Namespace:"calico-apiserver", SelfLink:"", UID:"a22d7efa-452f-4f58-901c-3556264cc279", ResourceVersion:"1088", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c994b7d8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f", Pod:"calico-apiserver-5c994b7d8-hgp4q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.201/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4fd132d924c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:47.186451 env[1418]: 2025-05-17 00:37:47.090 [INFO][5324] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" May 17 00:37:47.186451 env[1418]: 2025-05-17 00:37:47.090 [INFO][5324] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" iface="eth0" netns="" May 17 00:37:47.186451 env[1418]: 2025-05-17 00:37:47.090 [INFO][5324] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" May 17 00:37:47.186451 env[1418]: 2025-05-17 00:37:47.090 [INFO][5324] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" May 17 00:37:47.186451 env[1418]: 2025-05-17 00:37:47.164 [INFO][5341] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" HandleID="k8s-pod-network.382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:37:47.186451 env[1418]: 2025-05-17 00:37:47.164 [INFO][5341] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:47.186451 env[1418]: 2025-05-17 00:37:47.168 [INFO][5341] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:47.186451 env[1418]: 2025-05-17 00:37:47.179 [WARNING][5341] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" HandleID="k8s-pod-network.382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:37:47.186451 env[1418]: 2025-05-17 00:37:47.179 [INFO][5341] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" HandleID="k8s-pod-network.382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:37:47.186451 env[1418]: 2025-05-17 00:37:47.183 [INFO][5341] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:47.186451 env[1418]: 2025-05-17 00:37:47.184 [INFO][5324] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae" May 17 00:37:47.187263 env[1418]: time="2025-05-17T00:37:47.187221608Z" level=info msg="TearDown network for sandbox \"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\" successfully" May 17 00:37:47.198740 env[1418]: time="2025-05-17T00:37:47.198703656Z" level=info msg="RemovePodSandbox \"382360f93257cf6916be0b27669da3c8615eef25da6dde771aecab8ad21e61ae\" returns successfully" May 17 00:37:47.199380 env[1418]: time="2025-05-17T00:37:47.199351864Z" level=info msg="StopPodSandbox for \"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\"" May 17 00:37:47.343589 env[1418]: time="2025-05-17T00:37:47.343542715Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:47.348852 env[1418]: 2025-05-17 00:37:47.282 [WARNING][5362] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"93164114-f6fa-4bf2-9171-1b5b8bd0773e", ResourceVersion:"962", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8", Pod:"coredns-7c65d6cfc9-95bqg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6af08eb94f0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:47.348852 env[1418]: 2025-05-17 00:37:47.283 [INFO][5362] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" May 17 00:37:47.348852 env[1418]: 2025-05-17 00:37:47.283 [INFO][5362] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" iface="eth0" netns="" May 17 00:37:47.348852 env[1418]: 2025-05-17 00:37:47.283 [INFO][5362] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" May 17 00:37:47.348852 env[1418]: 2025-05-17 00:37:47.283 [INFO][5362] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" May 17 00:37:47.348852 env[1418]: 2025-05-17 00:37:47.329 [INFO][5369] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" HandleID="k8s-pod-network.b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0" May 17 00:37:47.348852 env[1418]: 2025-05-17 00:37:47.329 [INFO][5369] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:47.348852 env[1418]: 2025-05-17 00:37:47.332 [INFO][5369] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:47.348852 env[1418]: 2025-05-17 00:37:47.339 [WARNING][5369] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" HandleID="k8s-pod-network.b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0" May 17 00:37:47.348852 env[1418]: 2025-05-17 00:37:47.339 [INFO][5369] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" HandleID="k8s-pod-network.b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0" May 17 00:37:47.348852 env[1418]: 2025-05-17 00:37:47.343 [INFO][5369] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:47.348852 env[1418]: 2025-05-17 00:37:47.344 [INFO][5362] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" May 17 00:37:47.349608 env[1418]: time="2025-05-17T00:37:47.349576693Z" level=info msg="TearDown network for sandbox \"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\" successfully" May 17 00:37:47.349685 env[1418]: time="2025-05-17T00:37:47.349668594Z" level=info msg="StopPodSandbox for \"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\" returns successfully" May 17 00:37:47.350324 env[1418]: time="2025-05-17T00:37:47.350297802Z" level=info msg="RemovePodSandbox for \"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\"" May 17 00:37:47.350489 env[1418]: time="2025-05-17T00:37:47.350446604Z" level=info msg="Forcibly stopping sandbox \"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\"" May 17 00:37:47.357504 env[1418]: time="2025-05-17T00:37:47.357475094Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:47.366628 env[1418]: time="2025-05-17T00:37:47.366588111Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:47.380477 env[1418]: time="2025-05-17T00:37:47.380440689Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:47.382559 env[1418]: time="2025-05-17T00:37:47.382525416Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:37:47.385924 env[1418]: time="2025-05-17T00:37:47.385895059Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:37:47.387058 env[1418]: time="2025-05-17T00:37:47.387006774Z" level=info msg="CreateContainer within sandbox \"6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:37:47.428036 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2612036925.mount: Deactivated successfully. May 17 00:37:47.451638 env[1418]: time="2025-05-17T00:37:47.450205785Z" level=info msg="CreateContainer within sandbox \"6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"0b481f4c368cffae88193562f681ac40dfea65c370e86e9504da3cf05b71e74b\"" May 17 00:37:47.452666 env[1418]: time="2025-05-17T00:37:47.452638516Z" level=info msg="StartContainer for \"0b481f4c368cffae88193562f681ac40dfea65c370e86e9504da3cf05b71e74b\"" May 17 00:37:47.474845 systemd[1]: Removed slice kubepods-besteffort-podcf614254_62a7_4620_98f1_308d50209507.slice. May 17 00:37:47.518786 kubelet[2411]: I0517 00:37:47.517391 2411 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7bd946bb48-54tkb" podStartSLOduration=6.517366148 podStartE2EDuration="6.517366148s" podCreationTimestamp="2025-05-17 00:37:41 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:37:47.486324849 +0000 UTC m=+62.138270659" watchObservedRunningTime="2025-05-17 00:37:47.517366148 +0000 UTC m=+62.169311958" May 17 00:37:47.541048 systemd[1]: Started cri-containerd-0b481f4c368cffae88193562f681ac40dfea65c370e86e9504da3cf05b71e74b.scope. May 17 00:37:47.571888 kernel: kauditd_printk_skb: 127 callbacks suppressed May 17 00:37:47.572055 kernel: audit: type=1325 audit(1747442267.558:1491): table=filter:147 family=2 entries=12 op=nft_register_rule pid=5413 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:47.558000 audit[5413]: NETFILTER_CFG table=filter:147 family=2 entries=12 op=nft_register_rule pid=5413 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:47.572376 env[1418]: time="2025-05-17T00:37:47.572331753Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:37:47.576704 env[1418]: time="2025-05-17T00:37:47.576657309Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:37:47.577793 kubelet[2411]: E0517 00:37:47.577237 2411 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:37:47.577793 kubelet[2411]: E0517 00:37:47.577287 2411 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:37:47.577793 kubelet[2411]: E0517 00:37:47.577402 2411 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:26dea4d59cac475bbf848f70692bf24a,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-z79vf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-55d4b57f4c-xrphf_calico-system(a3dfc93e-f9da-4eec-b12c-30e9f327b06d): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:37:47.579906 env[1418]: time="2025-05-17T00:37:47.579877950Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:37:47.602834 kernel: audit: type=1300 audit(1747442267.558:1491): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd0cbbf7f0 a2=0 a3=7ffd0cbbf7dc items=0 ppid=2515 pid=5413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:47.558000 audit[5413]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd0cbbf7f0 a2=0 a3=7ffd0cbbf7dc items=0 ppid=2515 pid=5413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:47.605519 env[1418]: 2025-05-17 00:37:47.448 [WARNING][5384] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"93164114-f6fa-4bf2-9171-1b5b8bd0773e", ResourceVersion:"962", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"f1b04e0730d728d137c864d52c6a47f32b97c68926eca9198b4c5fd0fa01ecd8", Pod:"coredns-7c65d6cfc9-95bqg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6af08eb94f0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:47.605519 env[1418]: 2025-05-17 00:37:47.448 [INFO][5384] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" May 17 00:37:47.605519 env[1418]: 2025-05-17 00:37:47.449 [INFO][5384] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" iface="eth0" netns="" May 17 00:37:47.605519 env[1418]: 2025-05-17 00:37:47.449 [INFO][5384] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" May 17 00:37:47.605519 env[1418]: 2025-05-17 00:37:47.449 [INFO][5384] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" May 17 00:37:47.605519 env[1418]: 2025-05-17 00:37:47.552 [INFO][5391] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" HandleID="k8s-pod-network.b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0" May 17 00:37:47.605519 env[1418]: 2025-05-17 00:37:47.553 [INFO][5391] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:47.605519 env[1418]: 2025-05-17 00:37:47.553 [INFO][5391] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:47.605519 env[1418]: 2025-05-17 00:37:47.572 [WARNING][5391] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" HandleID="k8s-pod-network.b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0" May 17 00:37:47.605519 env[1418]: 2025-05-17 00:37:47.572 [INFO][5391] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" HandleID="k8s-pod-network.b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--95bqg-eth0" May 17 00:37:47.605519 env[1418]: 2025-05-17 00:37:47.575 [INFO][5391] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:47.605519 env[1418]: 2025-05-17 00:37:47.580 [INFO][5384] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5" May 17 00:37:47.607120 env[1418]: time="2025-05-17T00:37:47.607044899Z" level=info msg="TearDown network for sandbox \"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\" successfully" May 17 00:37:47.558000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:47.619182 env[1418]: time="2025-05-17T00:37:47.619093554Z" level=info msg="RemovePodSandbox \"b40efd5116ea9ab43710110868f4320d8b07ee19e7082117ae86f7818be585b5\" returns successfully" May 17 00:37:47.619815 kernel: audit: type=1327 audit(1747442267.558:1491): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:47.620249 env[1418]: time="2025-05-17T00:37:47.620208868Z" level=info msg="StopPodSandbox for \"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\"" May 17 00:37:47.587000 audit[5413]: NETFILTER_CFG table=nat:148 family=2 entries=36 op=nft_register_rule pid=5413 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:47.631797 kernel: audit: type=1325 audit(1747442267.587:1492): table=nat:148 family=2 entries=36 op=nft_register_rule pid=5413 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:47.587000 audit[5413]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd0cbbf7f0 a2=0 a3=7ffd0cbbf7dc items=0 ppid=2515 pid=5413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:47.654780 kernel: audit: type=1300 audit(1747442267.587:1492): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd0cbbf7f0 a2=0 a3=7ffd0cbbf7dc items=0 ppid=2515 pid=5413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:47.587000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:47.666821 kernel: audit: type=1327 audit(1747442267.587:1492): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:47.681798 kernel: audit: type=1400 audit(1747442267.608:1493): avc: denied { perfmon } for pid=5402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { perfmon } for pid=5402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.684554 env[1418]: time="2025-05-17T00:37:47.683836585Z" level=info msg="StartContainer for \"0b481f4c368cffae88193562f681ac40dfea65c370e86e9504da3cf05b71e74b\" returns successfully" May 17 00:37:47.608000 audit[5402]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f78f0e810a8 items=0 ppid=4649 pid=5402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:47.706053 kernel: audit: type=1300 audit(1747442267.608:1493): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f78f0e810a8 items=0 ppid=4649 pid=5402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:47.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062343831663463333638636666616538383139333536326636383161 May 17 00:37:47.724785 kernel: audit: type=1327 audit(1747442267.608:1493): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062343831663463333638636666616538383139333536326636383161 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { bpf } for pid=5402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.737779 kernel: audit: type=1400 audit(1747442267.608:1494): avc: denied { bpf } for pid=5402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { bpf } for pid=5402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { bpf } for pid=5402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { perfmon } for pid=5402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { perfmon } for pid=5402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { perfmon } for pid=5402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { perfmon } for pid=5402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { perfmon } for pid=5402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { bpf } for pid=5402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { bpf } for pid=5402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit: BPF prog-id=227 op=LOAD May 17 00:37:47.608000 audit[5402]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f8db8 items=0 ppid=4649 pid=5402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:47.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062343831663463333638636666616538383139333536326636383161 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { bpf } for pid=5402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { bpf } for pid=5402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { perfmon } for pid=5402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { perfmon } for pid=5402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { perfmon } for pid=5402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { perfmon } for pid=5402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { perfmon } for pid=5402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { bpf } for pid=5402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { bpf } for pid=5402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit: BPF prog-id=228 op=LOAD May 17 00:37:47.608000 audit[5402]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f8e08 items=0 ppid=4649 pid=5402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:47.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062343831663463333638636666616538383139333536326636383161 May 17 00:37:47.608000 audit: BPF prog-id=228 op=UNLOAD May 17 00:37:47.608000 audit: BPF prog-id=227 op=UNLOAD May 17 00:37:47.608000 audit[5402]: AVC avc: denied { bpf } for pid=5402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { bpf } for pid=5402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { bpf } for pid=5402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { perfmon } for pid=5402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { perfmon } for pid=5402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { perfmon } for pid=5402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { perfmon } for pid=5402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { perfmon } for pid=5402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { bpf } for pid=5402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit[5402]: AVC avc: denied { bpf } for pid=5402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.608000 audit: BPF prog-id=229 op=LOAD May 17 00:37:47.608000 audit[5402]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f8e98 items=0 ppid=4649 pid=5402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:47.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062343831663463333638636666616538383139333536326636383161 May 17 00:37:47.794138 env[1418]: 2025-05-17 00:37:47.742 [WARNING][5434] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"6c0070f8-dd11-4a02-a60b-d807c5fc3160", ResourceVersion:"1084", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1", Pod:"goldmane-8f77d7b6c-shhph", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.34.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali0b7fe82a126", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:47.794138 env[1418]: 2025-05-17 00:37:47.743 [INFO][5434] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" May 17 00:37:47.794138 env[1418]: 2025-05-17 00:37:47.743 [INFO][5434] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" iface="eth0" netns="" May 17 00:37:47.794138 env[1418]: 2025-05-17 00:37:47.743 [INFO][5434] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" May 17 00:37:47.794138 env[1418]: 2025-05-17 00:37:47.743 [INFO][5434] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" May 17 00:37:47.794138 env[1418]: 2025-05-17 00:37:47.778 [INFO][5444] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" HandleID="k8s-pod-network.8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" Workload="ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0" May 17 00:37:47.794138 env[1418]: 2025-05-17 00:37:47.778 [INFO][5444] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:47.794138 env[1418]: 2025-05-17 00:37:47.782 [INFO][5444] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:47.794138 env[1418]: 2025-05-17 00:37:47.789 [WARNING][5444] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" HandleID="k8s-pod-network.8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" Workload="ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0" May 17 00:37:47.794138 env[1418]: 2025-05-17 00:37:47.789 [INFO][5444] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" HandleID="k8s-pod-network.8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" Workload="ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0" May 17 00:37:47.794138 env[1418]: 2025-05-17 00:37:47.790 [INFO][5444] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:47.794138 env[1418]: 2025-05-17 00:37:47.792 [INFO][5434] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" May 17 00:37:47.794664 env[1418]: time="2025-05-17T00:37:47.794177302Z" level=info msg="TearDown network for sandbox \"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\" successfully" May 17 00:37:47.794664 env[1418]: time="2025-05-17T00:37:47.794218203Z" level=info msg="StopPodSandbox for \"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\" returns successfully" May 17 00:37:47.795226 env[1418]: time="2025-05-17T00:37:47.795187815Z" level=info msg="RemovePodSandbox for \"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\"" May 17 00:37:47.795362 env[1418]: time="2025-05-17T00:37:47.795233716Z" level=info msg="Forcibly stopping sandbox \"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\"" May 17 00:37:47.796126 env[1418]: time="2025-05-17T00:37:47.796082827Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:37:47.798843 env[1418]: time="2025-05-17T00:37:47.798797561Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:37:47.799240 kubelet[2411]: E0517 00:37:47.799003 2411 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:37:47.799240 kubelet[2411]: E0517 00:37:47.799081 2411 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:37:47.799404 kubelet[2411]: E0517 00:37:47.799297 2411 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-z79vf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-55d4b57f4c-xrphf_calico-system(a3dfc93e-f9da-4eec-b12c-30e9f327b06d): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:37:47.800712 kubelet[2411]: E0517 00:37:47.800674 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-55d4b57f4c-xrphf" podUID="a3dfc93e-f9da-4eec-b12c-30e9f327b06d" May 17 00:37:47.802115 env[1418]: time="2025-05-17T00:37:47.802080504Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:37:47.897342 env[1418]: 2025-05-17 00:37:47.847 [WARNING][5458] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"6c0070f8-dd11-4a02-a60b-d807c5fc3160", ResourceVersion:"1084", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"2426185c45d6d7826845adf70ceb3616ad614f869cd51f9a4742f9afcbffaab1", Pod:"goldmane-8f77d7b6c-shhph", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.34.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali0b7fe82a126", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:47.897342 env[1418]: 2025-05-17 00:37:47.848 [INFO][5458] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" May 17 00:37:47.897342 env[1418]: 2025-05-17 00:37:47.848 [INFO][5458] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" iface="eth0" netns="" May 17 00:37:47.897342 env[1418]: 2025-05-17 00:37:47.848 [INFO][5458] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" May 17 00:37:47.897342 env[1418]: 2025-05-17 00:37:47.848 [INFO][5458] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" May 17 00:37:47.897342 env[1418]: 2025-05-17 00:37:47.885 [INFO][5466] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" HandleID="k8s-pod-network.8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" Workload="ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0" May 17 00:37:47.897342 env[1418]: 2025-05-17 00:37:47.885 [INFO][5466] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:47.897342 env[1418]: 2025-05-17 00:37:47.886 [INFO][5466] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:47.897342 env[1418]: 2025-05-17 00:37:47.892 [WARNING][5466] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" HandleID="k8s-pod-network.8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" Workload="ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0" May 17 00:37:47.897342 env[1418]: 2025-05-17 00:37:47.892 [INFO][5466] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" HandleID="k8s-pod-network.8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" Workload="ci--3510.3.7--n--cef16a74b5-k8s-goldmane--8f77d7b6c--shhph-eth0" May 17 00:37:47.897342 env[1418]: 2025-05-17 00:37:47.894 [INFO][5466] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:47.897342 env[1418]: 2025-05-17 00:37:47.896 [INFO][5458] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f" May 17 00:37:47.898186 env[1418]: time="2025-05-17T00:37:47.897356727Z" level=info msg="TearDown network for sandbox \"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\" successfully" May 17 00:37:47.909701 env[1418]: time="2025-05-17T00:37:47.909638085Z" level=info msg="RemovePodSandbox \"8f48028bd05cb913b54c0beb622f2fbaee211b52866bab4d4974c2fb546dba9f\" returns successfully" May 17 00:37:47.910563 env[1418]: time="2025-05-17T00:37:47.910534396Z" level=info msg="StopPodSandbox for \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\"" May 17 00:37:48.011632 env[1418]: 2025-05-17 00:37:47.966 [WARNING][5480] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:48.011632 env[1418]: 2025-05-17 00:37:47.966 [INFO][5480] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" May 17 00:37:48.011632 env[1418]: 2025-05-17 00:37:47.966 [INFO][5480] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" iface="eth0" netns="" May 17 00:37:48.011632 env[1418]: 2025-05-17 00:37:47.966 [INFO][5480] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" May 17 00:37:48.011632 env[1418]: 2025-05-17 00:37:47.966 [INFO][5480] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" May 17 00:37:48.011632 env[1418]: 2025-05-17 00:37:47.997 [INFO][5487] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" HandleID="k8s-pod-network.84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:48.011632 env[1418]: 2025-05-17 00:37:47.997 [INFO][5487] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:48.011632 env[1418]: 2025-05-17 00:37:47.998 [INFO][5487] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:48.011632 env[1418]: 2025-05-17 00:37:48.004 [WARNING][5487] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" HandleID="k8s-pod-network.84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:48.011632 env[1418]: 2025-05-17 00:37:48.004 [INFO][5487] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" HandleID="k8s-pod-network.84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:48.011632 env[1418]: 2025-05-17 00:37:48.007 [INFO][5487] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:48.011632 env[1418]: 2025-05-17 00:37:48.009 [INFO][5480] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" May 17 00:37:48.011632 env[1418]: time="2025-05-17T00:37:48.010857883Z" level=info msg="TearDown network for sandbox \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\" successfully" May 17 00:37:48.011632 env[1418]: time="2025-05-17T00:37:48.010895183Z" level=info msg="StopPodSandbox for \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\" returns successfully" May 17 00:37:48.016048 env[1418]: time="2025-05-17T00:37:48.016013448Z" level=info msg="RemovePodSandbox for \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\"" May 17 00:37:48.016171 env[1418]: time="2025-05-17T00:37:48.016057249Z" level=info msg="Forcibly stopping sandbox \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\"" May 17 00:37:48.062087 systemd[1]: run-containerd-runc-k8s.io-0b481f4c368cffae88193562f681ac40dfea65c370e86e9504da3cf05b71e74b-runc.Ub69Jx.mount: Deactivated successfully. May 17 00:37:48.088320 kubelet[2411]: I0517 00:37:48.088277 2411 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="cf614254-62a7-4620-98f1-308d50209507" path="/var/lib/kubelet/pods/cf614254-62a7-4620-98f1-308d50209507/volumes" May 17 00:37:48.114018 env[1418]: 2025-05-17 00:37:48.065 [WARNING][5501] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:48.114018 env[1418]: 2025-05-17 00:37:48.066 [INFO][5501] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" May 17 00:37:48.114018 env[1418]: 2025-05-17 00:37:48.066 [INFO][5501] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" iface="eth0" netns="" May 17 00:37:48.114018 env[1418]: 2025-05-17 00:37:48.066 [INFO][5501] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" May 17 00:37:48.114018 env[1418]: 2025-05-17 00:37:48.066 [INFO][5501] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" May 17 00:37:48.114018 env[1418]: 2025-05-17 00:37:48.101 [INFO][5509] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" HandleID="k8s-pod-network.84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:48.114018 env[1418]: 2025-05-17 00:37:48.101 [INFO][5509] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:48.114018 env[1418]: 2025-05-17 00:37:48.101 [INFO][5509] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:48.114018 env[1418]: 2025-05-17 00:37:48.109 [WARNING][5509] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" HandleID="k8s-pod-network.84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:48.114018 env[1418]: 2025-05-17 00:37:48.109 [INFO][5509] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" HandleID="k8s-pod-network.84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:37:48.114018 env[1418]: 2025-05-17 00:37:48.111 [INFO][5509] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:48.114018 env[1418]: 2025-05-17 00:37:48.112 [INFO][5501] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c" May 17 00:37:48.115145 env[1418]: time="2025-05-17T00:37:48.115108404Z" level=info msg="TearDown network for sandbox \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\" successfully" May 17 00:37:48.124318 env[1418]: time="2025-05-17T00:37:48.124265920Z" level=info msg="RemovePodSandbox \"84281eb736a41bb93f8d7f5c5524c6f70f0f2d436dde7aa4ad2f83422225353c\" returns successfully" May 17 00:37:48.124983 env[1418]: time="2025-05-17T00:37:48.124957329Z" level=info msg="StopPodSandbox for \"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\"" May 17 00:37:48.172921 systemd-networkd[1573]: cali96972d16ba0: Gained IPv6LL May 17 00:37:48.252064 env[1418]: 2025-05-17 00:37:48.192 [WARNING][5525] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0", GenerateName:"calico-kube-controllers-85557d7668-", Namespace:"calico-system", SelfLink:"", UID:"347bafb1-edcc-4760-a4b8-54009b8f96fa", ResourceVersion:"1098", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85557d7668", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17", Pod:"calico-kube-controllers-85557d7668-6rdqn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.34.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib006699f912", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:48.252064 env[1418]: 2025-05-17 00:37:48.192 [INFO][5525] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" May 17 00:37:48.252064 env[1418]: 2025-05-17 00:37:48.192 [INFO][5525] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" iface="eth0" netns="" May 17 00:37:48.252064 env[1418]: 2025-05-17 00:37:48.192 [INFO][5525] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" May 17 00:37:48.252064 env[1418]: 2025-05-17 00:37:48.192 [INFO][5525] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" May 17 00:37:48.252064 env[1418]: 2025-05-17 00:37:48.227 [INFO][5532] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" HandleID="k8s-pod-network.331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0" May 17 00:37:48.252064 env[1418]: 2025-05-17 00:37:48.227 [INFO][5532] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:48.252064 env[1418]: 2025-05-17 00:37:48.227 [INFO][5532] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:48.252064 env[1418]: 2025-05-17 00:37:48.245 [WARNING][5532] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" HandleID="k8s-pod-network.331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0" May 17 00:37:48.252064 env[1418]: 2025-05-17 00:37:48.245 [INFO][5532] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" HandleID="k8s-pod-network.331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0" May 17 00:37:48.252064 env[1418]: 2025-05-17 00:37:48.248 [INFO][5532] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:48.252064 env[1418]: 2025-05-17 00:37:48.250 [INFO][5525] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" May 17 00:37:48.252746 env[1418]: time="2025-05-17T00:37:48.252106340Z" level=info msg="TearDown network for sandbox \"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\" successfully" May 17 00:37:48.252746 env[1418]: time="2025-05-17T00:37:48.252143741Z" level=info msg="StopPodSandbox for \"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\" returns successfully" May 17 00:37:48.252746 env[1418]: time="2025-05-17T00:37:48.252723648Z" level=info msg="RemovePodSandbox for \"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\"" May 17 00:37:48.252894 env[1418]: time="2025-05-17T00:37:48.252779449Z" level=info msg="Forcibly stopping sandbox \"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\"" May 17 00:37:48.353072 env[1418]: 2025-05-17 00:37:48.304 [WARNING][5547] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0", GenerateName:"calico-kube-controllers-85557d7668-", Namespace:"calico-system", SelfLink:"", UID:"347bafb1-edcc-4760-a4b8-54009b8f96fa", ResourceVersion:"1098", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85557d7668", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"bd38001f3c2f442ada0833c75d2287fada4bb3a5784d30f62941200e058e8e17", Pod:"calico-kube-controllers-85557d7668-6rdqn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.34.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib006699f912", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:48.353072 env[1418]: 2025-05-17 00:37:48.304 [INFO][5547] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" May 17 00:37:48.353072 env[1418]: 2025-05-17 00:37:48.304 [INFO][5547] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" iface="eth0" netns="" May 17 00:37:48.353072 env[1418]: 2025-05-17 00:37:48.304 [INFO][5547] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" May 17 00:37:48.353072 env[1418]: 2025-05-17 00:37:48.304 [INFO][5547] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" May 17 00:37:48.353072 env[1418]: 2025-05-17 00:37:48.341 [INFO][5554] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" HandleID="k8s-pod-network.331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0" May 17 00:37:48.353072 env[1418]: 2025-05-17 00:37:48.341 [INFO][5554] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:48.353072 env[1418]: 2025-05-17 00:37:48.341 [INFO][5554] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:48.353072 env[1418]: 2025-05-17 00:37:48.348 [WARNING][5554] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" HandleID="k8s-pod-network.331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0" May 17 00:37:48.353072 env[1418]: 2025-05-17 00:37:48.348 [INFO][5554] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" HandleID="k8s-pod-network.331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--kube--controllers--85557d7668--6rdqn-eth0" May 17 00:37:48.353072 env[1418]: 2025-05-17 00:37:48.350 [INFO][5554] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:48.353072 env[1418]: 2025-05-17 00:37:48.351 [INFO][5547] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c" May 17 00:37:48.353905 env[1418]: time="2025-05-17T00:37:48.353849230Z" level=info msg="TearDown network for sandbox \"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\" successfully" May 17 00:37:48.365307 env[1418]: time="2025-05-17T00:37:48.365255774Z" level=info msg="RemovePodSandbox \"331aa073e9851a56635319b9e6338562db40be3e042f23665d24bff02213831c\" returns successfully" May 17 00:37:48.366022 env[1418]: time="2025-05-17T00:37:48.365986684Z" level=info msg="StopPodSandbox for \"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\"" May 17 00:37:48.476999 env[1418]: 2025-05-17 00:37:48.413 [WARNING][5569] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"6f5898dd-362a-45eb-be33-c0265577ee40", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e", Pod:"coredns-7c65d6cfc9-762rf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie5f703aa071", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:48.476999 env[1418]: 2025-05-17 00:37:48.414 [INFO][5569] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" May 17 00:37:48.476999 env[1418]: 2025-05-17 00:37:48.414 [INFO][5569] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" iface="eth0" netns="" May 17 00:37:48.476999 env[1418]: 2025-05-17 00:37:48.414 [INFO][5569] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" May 17 00:37:48.476999 env[1418]: 2025-05-17 00:37:48.414 [INFO][5569] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" May 17 00:37:48.476999 env[1418]: 2025-05-17 00:37:48.454 [INFO][5576] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" HandleID="k8s-pod-network.30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0" May 17 00:37:48.476999 env[1418]: 2025-05-17 00:37:48.454 [INFO][5576] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:48.476999 env[1418]: 2025-05-17 00:37:48.455 [INFO][5576] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:48.476999 env[1418]: 2025-05-17 00:37:48.470 [WARNING][5576] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" HandleID="k8s-pod-network.30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0" May 17 00:37:48.476999 env[1418]: 2025-05-17 00:37:48.470 [INFO][5576] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" HandleID="k8s-pod-network.30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0" May 17 00:37:48.476999 env[1418]: 2025-05-17 00:37:48.471 [INFO][5576] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:48.476999 env[1418]: 2025-05-17 00:37:48.474 [INFO][5569] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" May 17 00:37:48.478050 kubelet[2411]: I0517 00:37:48.477282 2411 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:37:48.478190 env[1418]: time="2025-05-17T00:37:48.478156905Z" level=info msg="TearDown network for sandbox \"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\" successfully" May 17 00:37:48.478274 env[1418]: time="2025-05-17T00:37:48.478257206Z" level=info msg="StopPodSandbox for \"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\" returns successfully" May 17 00:37:48.478700 env[1418]: time="2025-05-17T00:37:48.478662612Z" level=info msg="RemovePodSandbox for \"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\"" May 17 00:37:48.478843 env[1418]: time="2025-05-17T00:37:48.478700212Z" level=info msg="Forcibly stopping sandbox \"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\"" May 17 00:37:48.570904 env[1418]: 2025-05-17 00:37:48.523 [WARNING][5591] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"6f5898dd-362a-45eb-be33-c0265577ee40", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 36, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"6ba704fd6a018f7d0bd693e4122f15d1735d69d17968194dd6a5a60448ab1d3e", Pod:"coredns-7c65d6cfc9-762rf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie5f703aa071", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:48.570904 env[1418]: 2025-05-17 00:37:48.523 [INFO][5591] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" May 17 00:37:48.570904 env[1418]: 2025-05-17 00:37:48.523 [INFO][5591] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" iface="eth0" netns="" May 17 00:37:48.570904 env[1418]: 2025-05-17 00:37:48.523 [INFO][5591] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" May 17 00:37:48.570904 env[1418]: 2025-05-17 00:37:48.523 [INFO][5591] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" May 17 00:37:48.570904 env[1418]: 2025-05-17 00:37:48.557 [INFO][5598] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" HandleID="k8s-pod-network.30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0" May 17 00:37:48.570904 env[1418]: 2025-05-17 00:37:48.558 [INFO][5598] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:48.570904 env[1418]: 2025-05-17 00:37:48.558 [INFO][5598] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:48.570904 env[1418]: 2025-05-17 00:37:48.565 [WARNING][5598] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" HandleID="k8s-pod-network.30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0" May 17 00:37:48.570904 env[1418]: 2025-05-17 00:37:48.565 [INFO][5598] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" HandleID="k8s-pod-network.30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" Workload="ci--3510.3.7--n--cef16a74b5-k8s-coredns--7c65d6cfc9--762rf-eth0" May 17 00:37:48.570904 env[1418]: 2025-05-17 00:37:48.566 [INFO][5598] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:48.570904 env[1418]: 2025-05-17 00:37:48.569 [INFO][5591] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5" May 17 00:37:48.571505 env[1418]: time="2025-05-17T00:37:48.571459388Z" level=info msg="TearDown network for sandbox \"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\" successfully" May 17 00:37:48.604652 env[1418]: time="2025-05-17T00:37:48.604554707Z" level=info msg="RemovePodSandbox \"30afb8c90f364936d69c5aa48cac5e013d6ee1845a62f450cfb14d0ab08f4da5\" returns successfully" May 17 00:37:48.607232 env[1418]: time="2025-05-17T00:37:48.607198341Z" level=info msg="StopPodSandbox for \"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\"" May 17 00:37:48.725599 env[1418]: 2025-05-17 00:37:48.658 [WARNING][5613] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"229d7143-68c7-4436-b5a7-e1de78e6c47a", ResourceVersion:"1003", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040", Pod:"csi-node-driver-ggd4c", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.34.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid8954e7bc60", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:48.725599 env[1418]: 2025-05-17 00:37:48.658 [INFO][5613] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" May 17 00:37:48.725599 env[1418]: 2025-05-17 00:37:48.661 [INFO][5613] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" iface="eth0" netns="" May 17 00:37:48.725599 env[1418]: 2025-05-17 00:37:48.661 [INFO][5613] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" May 17 00:37:48.725599 env[1418]: 2025-05-17 00:37:48.661 [INFO][5613] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" May 17 00:37:48.725599 env[1418]: 2025-05-17 00:37:48.711 [INFO][5620] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" HandleID="k8s-pod-network.254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" Workload="ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0" May 17 00:37:48.725599 env[1418]: 2025-05-17 00:37:48.711 [INFO][5620] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:48.725599 env[1418]: 2025-05-17 00:37:48.711 [INFO][5620] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:48.725599 env[1418]: 2025-05-17 00:37:48.721 [WARNING][5620] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" HandleID="k8s-pod-network.254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" Workload="ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0" May 17 00:37:48.725599 env[1418]: 2025-05-17 00:37:48.721 [INFO][5620] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" HandleID="k8s-pod-network.254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" Workload="ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0" May 17 00:37:48.725599 env[1418]: 2025-05-17 00:37:48.723 [INFO][5620] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:48.725599 env[1418]: 2025-05-17 00:37:48.724 [INFO][5613] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" May 17 00:37:48.726432 env[1418]: time="2025-05-17T00:37:48.725613641Z" level=info msg="TearDown network for sandbox \"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\" successfully" May 17 00:37:48.726432 env[1418]: time="2025-05-17T00:37:48.725645542Z" level=info msg="StopPodSandbox for \"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\" returns successfully" May 17 00:37:48.726432 env[1418]: time="2025-05-17T00:37:48.726392351Z" level=info msg="RemovePodSandbox for \"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\"" May 17 00:37:48.726631 env[1418]: time="2025-05-17T00:37:48.726431252Z" level=info msg="Forcibly stopping sandbox \"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\"" May 17 00:37:48.813660 env[1418]: 2025-05-17 00:37:48.773 [WARNING][5634] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"229d7143-68c7-4436-b5a7-e1de78e6c47a", ResourceVersion:"1003", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-cef16a74b5", ContainerID:"6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040", Pod:"csi-node-driver-ggd4c", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.34.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid8954e7bc60", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:48.813660 env[1418]: 2025-05-17 00:37:48.773 [INFO][5634] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" May 17 00:37:48.813660 env[1418]: 2025-05-17 00:37:48.773 [INFO][5634] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" iface="eth0" netns="" May 17 00:37:48.813660 env[1418]: 2025-05-17 00:37:48.773 [INFO][5634] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" May 17 00:37:48.813660 env[1418]: 2025-05-17 00:37:48.773 [INFO][5634] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" May 17 00:37:48.813660 env[1418]: 2025-05-17 00:37:48.800 [INFO][5642] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" HandleID="k8s-pod-network.254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" Workload="ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0" May 17 00:37:48.813660 env[1418]: 2025-05-17 00:37:48.801 [INFO][5642] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:48.813660 env[1418]: 2025-05-17 00:37:48.801 [INFO][5642] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:48.813660 env[1418]: 2025-05-17 00:37:48.808 [WARNING][5642] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" HandleID="k8s-pod-network.254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" Workload="ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0" May 17 00:37:48.813660 env[1418]: 2025-05-17 00:37:48.809 [INFO][5642] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" HandleID="k8s-pod-network.254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" Workload="ci--3510.3.7--n--cef16a74b5-k8s-csi--node--driver--ggd4c-eth0" May 17 00:37:48.813660 env[1418]: 2025-05-17 00:37:48.810 [INFO][5642] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:48.813660 env[1418]: 2025-05-17 00:37:48.812 [INFO][5634] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10" May 17 00:37:48.814692 env[1418]: time="2025-05-17T00:37:48.814652370Z" level=info msg="TearDown network for sandbox \"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\" successfully" May 17 00:37:48.826781 env[1418]: time="2025-05-17T00:37:48.826737923Z" level=info msg="RemovePodSandbox \"254a84fa4c879b8e908e0f0cec9e8333c8bb40a21d4c04efde2684dbd6846e10\" returns successfully" May 17 00:37:48.827373 env[1418]: time="2025-05-17T00:37:48.827342931Z" level=info msg="StopPodSandbox for \"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\"" May 17 00:37:48.904023 systemd[1]: run-containerd-runc-k8s.io-c2e8bb3ef54ff49b0802ffa399482a08c1c08acd49405db0c8bedf8b54a3e235-runc.W0PANy.mount: Deactivated successfully. May 17 00:37:48.965235 env[1418]: 2025-05-17 00:37:48.886 [WARNING][5656] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-whisker--58db6cc6f9--2m87s-eth0" May 17 00:37:48.965235 env[1418]: 2025-05-17 00:37:48.886 [INFO][5656] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" May 17 00:37:48.965235 env[1418]: 2025-05-17 00:37:48.886 [INFO][5656] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" iface="eth0" netns="" May 17 00:37:48.965235 env[1418]: 2025-05-17 00:37:48.886 [INFO][5656] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" May 17 00:37:48.965235 env[1418]: 2025-05-17 00:37:48.886 [INFO][5656] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" May 17 00:37:48.965235 env[1418]: 2025-05-17 00:37:48.947 [INFO][5671] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" HandleID="k8s-pod-network.f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" Workload="ci--3510.3.7--n--cef16a74b5-k8s-whisker--58db6cc6f9--2m87s-eth0" May 17 00:37:48.965235 env[1418]: 2025-05-17 00:37:48.947 [INFO][5671] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:48.965235 env[1418]: 2025-05-17 00:37:48.947 [INFO][5671] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:48.965235 env[1418]: 2025-05-17 00:37:48.958 [WARNING][5671] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" HandleID="k8s-pod-network.f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" Workload="ci--3510.3.7--n--cef16a74b5-k8s-whisker--58db6cc6f9--2m87s-eth0" May 17 00:37:48.965235 env[1418]: 2025-05-17 00:37:48.958 [INFO][5671] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" HandleID="k8s-pod-network.f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" Workload="ci--3510.3.7--n--cef16a74b5-k8s-whisker--58db6cc6f9--2m87s-eth0" May 17 00:37:48.965235 env[1418]: 2025-05-17 00:37:48.960 [INFO][5671] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:48.965235 env[1418]: 2025-05-17 00:37:48.963 [INFO][5656] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" May 17 00:37:48.966001 env[1418]: time="2025-05-17T00:37:48.965961987Z" level=info msg="TearDown network for sandbox \"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\" successfully" May 17 00:37:48.966099 env[1418]: time="2025-05-17T00:37:48.966071689Z" level=info msg="StopPodSandbox for \"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\" returns successfully" May 17 00:37:48.966789 env[1418]: time="2025-05-17T00:37:48.966735797Z" level=info msg="RemovePodSandbox for \"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\"" May 17 00:37:48.966981 env[1418]: time="2025-05-17T00:37:48.966935400Z" level=info msg="Forcibly stopping sandbox \"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\"" May 17 00:37:49.146794 env[1418]: 2025-05-17 00:37:49.092 [WARNING][5693] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-whisker--58db6cc6f9--2m87s-eth0" May 17 00:37:49.146794 env[1418]: 2025-05-17 00:37:49.092 [INFO][5693] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" May 17 00:37:49.146794 env[1418]: 2025-05-17 00:37:49.093 [INFO][5693] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" iface="eth0" netns="" May 17 00:37:49.146794 env[1418]: 2025-05-17 00:37:49.093 [INFO][5693] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" May 17 00:37:49.146794 env[1418]: 2025-05-17 00:37:49.093 [INFO][5693] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" May 17 00:37:49.146794 env[1418]: 2025-05-17 00:37:49.129 [INFO][5703] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" HandleID="k8s-pod-network.f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" Workload="ci--3510.3.7--n--cef16a74b5-k8s-whisker--58db6cc6f9--2m87s-eth0" May 17 00:37:49.146794 env[1418]: 2025-05-17 00:37:49.129 [INFO][5703] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:49.146794 env[1418]: 2025-05-17 00:37:49.129 [INFO][5703] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:49.146794 env[1418]: 2025-05-17 00:37:49.138 [WARNING][5703] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" HandleID="k8s-pod-network.f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" Workload="ci--3510.3.7--n--cef16a74b5-k8s-whisker--58db6cc6f9--2m87s-eth0" May 17 00:37:49.146794 env[1418]: 2025-05-17 00:37:49.138 [INFO][5703] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" HandleID="k8s-pod-network.f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" Workload="ci--3510.3.7--n--cef16a74b5-k8s-whisker--58db6cc6f9--2m87s-eth0" May 17 00:37:49.146794 env[1418]: 2025-05-17 00:37:49.143 [INFO][5703] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:49.146794 env[1418]: 2025-05-17 00:37:49.145 [INFO][5693] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e" May 17 00:37:49.147692 env[1418]: time="2025-05-17T00:37:49.146839156Z" level=info msg="TearDown network for sandbox \"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\" successfully" May 17 00:37:49.210562 env[1418]: time="2025-05-17T00:37:49.210426952Z" level=info msg="RemovePodSandbox \"f052ba2e794bedbf2e46fba76523ae2e79fa6540b40622dbd1a847229233fe0e\" returns successfully" May 17 00:37:49.389000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:49.389000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002964a40 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:37:49.389000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:49.389000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:49.389000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00287c480 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:37:49.389000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:49.390000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:49.390000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00287c620 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:37:49.390000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:49.390000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:49.390000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00287c640 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:37:49.390000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:49.627809 env[1418]: time="2025-05-17T00:37:49.627742073Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:49.634699 env[1418]: time="2025-05-17T00:37:49.634653559Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:49.639442 env[1418]: time="2025-05-17T00:37:49.639405419Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:49.644499 env[1418]: time="2025-05-17T00:37:49.644460482Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:49.645291 env[1418]: time="2025-05-17T00:37:49.645249292Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:37:49.648588 env[1418]: time="2025-05-17T00:37:49.648548433Z" level=info msg="CreateContainer within sandbox \"6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:37:49.696992 env[1418]: time="2025-05-17T00:37:49.696943039Z" level=info msg="CreateContainer within sandbox \"6481387a38c2abb6ad2b1c38ab4ee827e8a57c6e9640fd08eb201226decb1040\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"fbc587d7a5550c9a0440c84924078f96f4884a8ed205a2945c3f947bc1806b95\"" May 17 00:37:49.697707 env[1418]: time="2025-05-17T00:37:49.697668548Z" level=info msg="StartContainer for \"fbc587d7a5550c9a0440c84924078f96f4884a8ed205a2945c3f947bc1806b95\"" May 17 00:37:49.732016 systemd[1]: run-containerd-runc-k8s.io-fbc587d7a5550c9a0440c84924078f96f4884a8ed205a2945c3f947bc1806b95-runc.SJLh32.mount: Deactivated successfully. May 17 00:37:49.737118 systemd[1]: Started cri-containerd-fbc587d7a5550c9a0440c84924078f96f4884a8ed205a2945c3f947bc1806b95.scope. May 17 00:37:49.753000 audit[5717]: AVC avc: denied { perfmon } for pid=5717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f9ba9245598 items=0 ppid=4649 pid=5717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:49.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662633538376437613535353063396130343430633834393234303738 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { bpf } for pid=5717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { bpf } for pid=5717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { bpf } for pid=5717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { perfmon } for pid=5717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { perfmon } for pid=5717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { perfmon } for pid=5717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { perfmon } for pid=5717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { perfmon } for pid=5717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { bpf } for pid=5717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { bpf } for pid=5717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit: BPF prog-id=230 op=LOAD May 17 00:37:49.753000 audit[5717]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c0000f5da8 items=0 ppid=4649 pid=5717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:49.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662633538376437613535353063396130343430633834393234303738 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { bpf } for pid=5717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { bpf } for pid=5717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { perfmon } for pid=5717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { perfmon } for pid=5717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { perfmon } for pid=5717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { perfmon } for pid=5717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { perfmon } for pid=5717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { bpf } for pid=5717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { bpf } for pid=5717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit: BPF prog-id=231 op=LOAD May 17 00:37:49.753000 audit[5717]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c0000f5df8 items=0 ppid=4649 pid=5717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:49.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662633538376437613535353063396130343430633834393234303738 May 17 00:37:49.753000 audit: BPF prog-id=231 op=UNLOAD May 17 00:37:49.753000 audit: BPF prog-id=230 op=UNLOAD May 17 00:37:49.753000 audit[5717]: AVC avc: denied { bpf } for pid=5717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { bpf } for pid=5717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { bpf } for pid=5717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { perfmon } for pid=5717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { perfmon } for pid=5717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { perfmon } for pid=5717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { perfmon } for pid=5717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { perfmon } for pid=5717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { bpf } for pid=5717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit[5717]: AVC avc: denied { bpf } for pid=5717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:49.753000 audit: BPF prog-id=232 op=LOAD May 17 00:37:49.753000 audit[5717]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c0000f5e88 items=0 ppid=4649 pid=5717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:49.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662633538376437613535353063396130343430633834393234303738 May 17 00:37:49.773784 env[1418]: time="2025-05-17T00:37:49.773707499Z" level=info msg="StartContainer for \"fbc587d7a5550c9a0440c84924078f96f4884a8ed205a2945c3f947bc1806b95\" returns successfully" May 17 00:37:49.867000 audit[5309]: AVC avc: denied { watch } for pid=5309 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_37_41.4073524260/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c693 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c586,c693 tclass=file permissive=0 May 17 00:37:49.867000 audit[5309]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a3f1c0 a2=fc6 a3=0 items=0 ppid=5203 pid=5309 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c693 key=(null) May 17 00:37:49.867000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:37:50.183489 kubelet[2411]: I0517 00:37:50.183451 2411 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:37:50.183489 kubelet[2411]: I0517 00:37:50.183491 2411 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:37:50.504927 kubelet[2411]: I0517 00:37:50.504786 2411 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-ggd4c" podStartSLOduration=30.65549077 podStartE2EDuration="44.504768166s" podCreationTimestamp="2025-05-17 00:37:06 +0000 UTC" firstStartedPulling="2025-05-17 00:37:35.797593516 +0000 UTC m=+50.449539226" lastFinishedPulling="2025-05-17 00:37:49.646870912 +0000 UTC m=+64.298816622" observedRunningTime="2025-05-17 00:37:50.50423926 +0000 UTC m=+65.156184970" watchObservedRunningTime="2025-05-17 00:37:50.504768166 +0000 UTC m=+65.156713876" May 17 00:37:55.086560 env[1418]: time="2025-05-17T00:37:55.086040327Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:37:55.261493 env[1418]: time="2025-05-17T00:37:55.261326367Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:37:55.265229 env[1418]: time="2025-05-17T00:37:55.265174712Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:37:55.265486 kubelet[2411]: E0517 00:37:55.265440 2411 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:37:55.265897 kubelet[2411]: E0517 00:37:55.265495 2411 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:37:55.265897 kubelet[2411]: E0517 00:37:55.265669 2411 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-jzznx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-shhph_calico-system(6c0070f8-dd11-4a02-a60b-d807c5fc3160): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:37:55.267332 kubelet[2411]: E0517 00:37:55.267299 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-shhph" podUID="6c0070f8-dd11-4a02-a60b-d807c5fc3160" May 17 00:37:56.761245 systemd[1]: run-containerd-runc-k8s.io-0c2f6a779a69fabb45cb2e90f43be91e3f28598b97e15cf715be17755c276045-runc.PLRCzq.mount: Deactivated successfully. May 17 00:38:03.085988 kubelet[2411]: E0517 00:38:03.085942 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-55d4b57f4c-xrphf" podUID="a3dfc93e-f9da-4eec-b12c-30e9f327b06d" May 17 00:38:07.112480 systemd[1]: run-containerd-runc-k8s.io-c2e8bb3ef54ff49b0802ffa399482a08c1c08acd49405db0c8bedf8b54a3e235-runc.s7gpFZ.mount: Deactivated successfully. May 17 00:38:08.087056 kubelet[2411]: E0517 00:38:08.087008 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-shhph" podUID="6c0070f8-dd11-4a02-a60b-d807c5fc3160" May 17 00:38:14.085733 env[1418]: time="2025-05-17T00:38:14.085676870Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:38:14.280501 env[1418]: time="2025-05-17T00:38:14.280431670Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:38:14.284628 env[1418]: time="2025-05-17T00:38:14.284562510Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:38:14.285121 kubelet[2411]: E0517 00:38:14.285065 2411 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:38:14.285524 kubelet[2411]: E0517 00:38:14.285137 2411 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:38:14.285524 kubelet[2411]: E0517 00:38:14.285274 2411 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:26dea4d59cac475bbf848f70692bf24a,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-z79vf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-55d4b57f4c-xrphf_calico-system(a3dfc93e-f9da-4eec-b12c-30e9f327b06d): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:38:14.287703 env[1418]: time="2025-05-17T00:38:14.287664540Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:38:14.474202 env[1418]: time="2025-05-17T00:38:14.474049059Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:38:14.477967 env[1418]: time="2025-05-17T00:38:14.477902896Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:38:14.478222 kubelet[2411]: E0517 00:38:14.478185 2411 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:38:14.478317 kubelet[2411]: E0517 00:38:14.478238 2411 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:38:14.478424 kubelet[2411]: E0517 00:38:14.478376 2411 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-z79vf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-55d4b57f4c-xrphf_calico-system(a3dfc93e-f9da-4eec-b12c-30e9f327b06d): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:38:14.479844 kubelet[2411]: E0517 00:38:14.479808 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-55d4b57f4c-xrphf" podUID="a3dfc93e-f9da-4eec-b12c-30e9f327b06d" May 17 00:38:18.894557 systemd[1]: run-containerd-runc-k8s.io-c2e8bb3ef54ff49b0802ffa399482a08c1c08acd49405db0c8bedf8b54a3e235-runc.Gyz7IZ.mount: Deactivated successfully. May 17 00:38:21.085946 env[1418]: time="2025-05-17T00:38:21.085646604Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:38:21.272891 env[1418]: time="2025-05-17T00:38:21.272817945Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:38:21.275819 env[1418]: time="2025-05-17T00:38:21.275735772Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:38:21.276146 kubelet[2411]: E0517 00:38:21.276079 2411 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:38:21.276520 kubelet[2411]: E0517 00:38:21.276175 2411 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:38:21.276520 kubelet[2411]: E0517 00:38:21.276380 2411 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-jzznx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-shhph_calico-system(6c0070f8-dd11-4a02-a60b-d807c5fc3160): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:38:21.277897 kubelet[2411]: E0517 00:38:21.277830 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-shhph" podUID="6c0070f8-dd11-4a02-a60b-d807c5fc3160" May 17 00:38:26.764471 systemd[1]: run-containerd-runc-k8s.io-0c2f6a779a69fabb45cb2e90f43be91e3f28598b97e15cf715be17755c276045-runc.4SIf09.mount: Deactivated successfully. May 17 00:38:28.087871 kubelet[2411]: E0517 00:38:28.087823 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-55d4b57f4c-xrphf" podUID="a3dfc93e-f9da-4eec-b12c-30e9f327b06d" May 17 00:38:33.085112 kubelet[2411]: E0517 00:38:33.085065 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-shhph" podUID="6c0070f8-dd11-4a02-a60b-d807c5fc3160" May 17 00:38:33.234528 kubelet[2411]: I0517 00:38:33.234478 2411 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:38:33.307414 env[1418]: time="2025-05-17T00:38:33.307366527Z" level=info msg="StopContainer for \"09c62a61bb70f84d61b0e767d54f7ddb403e1c28a2e52eec58b8271315e6e69b\" with timeout 30 (s)" May 17 00:38:33.308227 env[1418]: time="2025-05-17T00:38:33.308084134Z" level=info msg="Stop container \"09c62a61bb70f84d61b0e767d54f7ddb403e1c28a2e52eec58b8271315e6e69b\" with signal terminated" May 17 00:38:33.360226 systemd[1]: cri-containerd-09c62a61bb70f84d61b0e767d54f7ddb403e1c28a2e52eec58b8271315e6e69b.scope: Deactivated successfully. May 17 00:38:33.360559 systemd[1]: cri-containerd-09c62a61bb70f84d61b0e767d54f7ddb403e1c28a2e52eec58b8271315e6e69b.scope: Consumed 1.485s CPU time. May 17 00:38:33.359000 audit: BPF prog-id=211 op=UNLOAD May 17 00:38:33.367187 kernel: kauditd_printk_skb: 97 callbacks suppressed May 17 00:38:33.367297 kernel: audit: type=1334 audit(1747442313.359:1510): prog-id=211 op=UNLOAD May 17 00:38:33.375000 audit: BPF prog-id=214 op=UNLOAD May 17 00:38:33.383810 kernel: audit: type=1334 audit(1747442313.375:1511): prog-id=214 op=UNLOAD May 17 00:38:33.403292 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-09c62a61bb70f84d61b0e767d54f7ddb403e1c28a2e52eec58b8271315e6e69b-rootfs.mount: Deactivated successfully. May 17 00:38:33.411710 env[1418]: time="2025-05-17T00:38:33.411653637Z" level=info msg="shim disconnected" id=09c62a61bb70f84d61b0e767d54f7ddb403e1c28a2e52eec58b8271315e6e69b May 17 00:38:33.411903 env[1418]: time="2025-05-17T00:38:33.411718038Z" level=warning msg="cleaning up after shim disconnected" id=09c62a61bb70f84d61b0e767d54f7ddb403e1c28a2e52eec58b8271315e6e69b namespace=k8s.io May 17 00:38:33.411903 env[1418]: time="2025-05-17T00:38:33.411732938Z" level=info msg="cleaning up dead shim" May 17 00:38:33.414000 audit[5877]: NETFILTER_CFG table=filter:149 family=2 entries=12 op=nft_register_rule pid=5877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:33.422520 env[1418]: time="2025-05-17T00:38:33.422480832Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:38:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5878 runtime=io.containerd.runc.v2\n" May 17 00:38:33.427778 kernel: audit: type=1325 audit(1747442313.414:1512): table=filter:149 family=2 entries=12 op=nft_register_rule pid=5877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:33.414000 audit[5877]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffcb9a6d7e0 a2=0 a3=7ffcb9a6d7cc items=0 ppid=2515 pid=5877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:33.414000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:33.462189 kernel: audit: type=1300 audit(1747442313.414:1512): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffcb9a6d7e0 a2=0 a3=7ffcb9a6d7cc items=0 ppid=2515 pid=5877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:33.462352 kernel: audit: type=1327 audit(1747442313.414:1512): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:33.438000 audit[5877]: NETFILTER_CFG table=nat:150 family=2 entries=40 op=nft_register_chain pid=5877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:33.472930 kernel: audit: type=1325 audit(1747442313.438:1513): table=nat:150 family=2 entries=40 op=nft_register_chain pid=5877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:33.438000 audit[5877]: SYSCALL arch=c000003e syscall=46 success=yes exit=13124 a0=3 a1=7ffcb9a6d7e0 a2=0 a3=7ffcb9a6d7cc items=0 ppid=2515 pid=5877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:33.493035 kernel: audit: type=1300 audit(1747442313.438:1513): arch=c000003e syscall=46 success=yes exit=13124 a0=3 a1=7ffcb9a6d7e0 a2=0 a3=7ffcb9a6d7cc items=0 ppid=2515 pid=5877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:33.438000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:33.504787 kernel: audit: type=1327 audit(1747442313.438:1513): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:33.508000 audit[5893]: NETFILTER_CFG table=filter:151 family=2 entries=12 op=nft_register_rule pid=5893 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:33.508000 audit[5893]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc07c5d920 a2=0 a3=7ffc07c5d90c items=0 ppid=2515 pid=5893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:33.538283 kernel: audit: type=1325 audit(1747442313.508:1514): table=filter:151 family=2 entries=12 op=nft_register_rule pid=5893 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:33.538471 kernel: audit: type=1300 audit(1747442313.508:1514): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc07c5d920 a2=0 a3=7ffc07c5d90c items=0 ppid=2515 pid=5893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:33.508000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:33.540000 audit[5893]: NETFILTER_CFG table=nat:152 family=2 entries=40 op=nft_unregister_chain pid=5893 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:33.540000 audit[5893]: SYSCALL arch=c000003e syscall=46 success=yes exit=11364 a0=3 a1=7ffc07c5d920 a2=0 a3=7ffc07c5d90c items=0 ppid=2515 pid=5893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:33.540000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:33.584493 env[1418]: time="2025-05-17T00:38:33.584359044Z" level=info msg="StopContainer for \"09c62a61bb70f84d61b0e767d54f7ddb403e1c28a2e52eec58b8271315e6e69b\" returns successfully" May 17 00:38:33.584962 env[1418]: time="2025-05-17T00:38:33.584922249Z" level=info msg="StopPodSandbox for \"f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f\"" May 17 00:38:33.585102 env[1418]: time="2025-05-17T00:38:33.585007650Z" level=info msg="Container to stop \"09c62a61bb70f84d61b0e767d54f7ddb403e1c28a2e52eec58b8271315e6e69b\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 17 00:38:33.591184 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f-shm.mount: Deactivated successfully. May 17 00:38:33.601000 audit: BPF prog-id=207 op=UNLOAD May 17 00:38:33.602487 systemd[1]: cri-containerd-f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f.scope: Deactivated successfully. May 17 00:38:33.605000 audit: BPF prog-id=210 op=UNLOAD May 17 00:38:33.635687 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f-rootfs.mount: Deactivated successfully. May 17 00:38:33.639710 env[1418]: time="2025-05-17T00:38:33.639646727Z" level=info msg="shim disconnected" id=f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f May 17 00:38:33.639932 env[1418]: time="2025-05-17T00:38:33.639909429Z" level=warning msg="cleaning up after shim disconnected" id=f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f namespace=k8s.io May 17 00:38:33.640033 env[1418]: time="2025-05-17T00:38:33.640018830Z" level=info msg="cleaning up dead shim" May 17 00:38:33.658335 env[1418]: time="2025-05-17T00:38:33.658284589Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:38:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5913 runtime=io.containerd.runc.v2\n" May 17 00:38:33.781499 systemd-networkd[1573]: cali4fd132d924c: Link DOWN May 17 00:38:33.781508 systemd-networkd[1573]: cali4fd132d924c: Lost carrier May 17 00:38:33.910121 env[1418]: 2025-05-17 00:38:33.780 [INFO][5935] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" May 17 00:38:33.910121 env[1418]: 2025-05-17 00:38:33.780 [INFO][5935] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" iface="eth0" netns="/var/run/netns/cni-3e65d942-840d-f54f-1e74-0141a6dfbb63" May 17 00:38:33.910121 env[1418]: 2025-05-17 00:38:33.780 [INFO][5935] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" iface="eth0" netns="/var/run/netns/cni-3e65d942-840d-f54f-1e74-0141a6dfbb63" May 17 00:38:33.910121 env[1418]: 2025-05-17 00:38:33.799 [INFO][5935] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" after=18.772164ms iface="eth0" netns="/var/run/netns/cni-3e65d942-840d-f54f-1e74-0141a6dfbb63" May 17 00:38:33.910121 env[1418]: 2025-05-17 00:38:33.799 [INFO][5935] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" May 17 00:38:33.910121 env[1418]: 2025-05-17 00:38:33.799 [INFO][5935] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" May 17 00:38:33.910121 env[1418]: 2025-05-17 00:38:33.850 [INFO][5946] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" HandleID="k8s-pod-network.f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:38:33.910121 env[1418]: 2025-05-17 00:38:33.851 [INFO][5946] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:33.910121 env[1418]: 2025-05-17 00:38:33.851 [INFO][5946] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:33.910121 env[1418]: 2025-05-17 00:38:33.905 [INFO][5946] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" HandleID="k8s-pod-network.f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:38:33.910121 env[1418]: 2025-05-17 00:38:33.905 [INFO][5946] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" HandleID="k8s-pod-network.f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:38:33.910121 env[1418]: 2025-05-17 00:38:33.906 [INFO][5946] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:33.910121 env[1418]: 2025-05-17 00:38:33.908 [INFO][5935] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" May 17 00:38:33.916572 systemd[1]: run-netns-cni\x2d3e65d942\x2d840d\x2df54f\x2d1e74\x2d0141a6dfbb63.mount: Deactivated successfully. May 17 00:38:33.921009 env[1418]: time="2025-05-17T00:38:33.920957081Z" level=info msg="TearDown network for sandbox \"f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f\" successfully" May 17 00:38:33.921191 env[1418]: time="2025-05-17T00:38:33.921168983Z" level=info msg="StopPodSandbox for \"f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f\" returns successfully" May 17 00:38:33.927000 audit[5954]: NETFILTER_CFG table=filter:153 family=2 entries=63 op=nft_register_rule pid=5954 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:33.927000 audit[5954]: SYSCALL arch=c000003e syscall=46 success=yes exit=11336 a0=3 a1=7ffd2a1fbce0 a2=0 a3=7ffd2a1fbccc items=0 ppid=3764 pid=5954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:33.927000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:33.928000 audit[5954]: NETFILTER_CFG table=filter:154 family=2 entries=2 op=nft_unregister_chain pid=5954 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:33.928000 audit[5954]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd2a1fbce0 a2=0 a3=555da5358000 items=0 ppid=3764 pid=5954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:33.928000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:34.038802 kubelet[2411]: I0517 00:38:34.038737 2411 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a22d7efa-452f-4f58-901c-3556264cc279-calico-apiserver-certs\") pod \"a22d7efa-452f-4f58-901c-3556264cc279\" (UID: \"a22d7efa-452f-4f58-901c-3556264cc279\") " May 17 00:38:34.039075 kubelet[2411]: I0517 00:38:34.038816 2411 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-hmk4g\" (UniqueName: \"kubernetes.io/projected/a22d7efa-452f-4f58-901c-3556264cc279-kube-api-access-hmk4g\") pod \"a22d7efa-452f-4f58-901c-3556264cc279\" (UID: \"a22d7efa-452f-4f58-901c-3556264cc279\") " May 17 00:38:34.050814 kubelet[2411]: I0517 00:38:34.042926 2411 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/a22d7efa-452f-4f58-901c-3556264cc279-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "a22d7efa-452f-4f58-901c-3556264cc279" (UID: "a22d7efa-452f-4f58-901c-3556264cc279"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 17 00:38:34.046626 systemd[1]: var-lib-kubelet-pods-a22d7efa\x2d452f\x2d4f58\x2d901c\x2d3556264cc279-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dhmk4g.mount: Deactivated successfully. May 17 00:38:34.051134 systemd[1]: var-lib-kubelet-pods-a22d7efa\x2d452f\x2d4f58\x2d901c\x2d3556264cc279-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 17 00:38:34.053128 kubelet[2411]: I0517 00:38:34.051929 2411 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/a22d7efa-452f-4f58-901c-3556264cc279-kube-api-access-hmk4g" (OuterVolumeSpecName: "kube-api-access-hmk4g") pod "a22d7efa-452f-4f58-901c-3556264cc279" (UID: "a22d7efa-452f-4f58-901c-3556264cc279"). InnerVolumeSpecName "kube-api-access-hmk4g". PluginName "kubernetes.io/projected", VolumeGidValue "" May 17 00:38:34.099402 systemd[1]: Removed slice kubepods-besteffort-poda22d7efa_452f_4f58_901c_3556264cc279.slice. May 17 00:38:34.099530 systemd[1]: kubepods-besteffort-poda22d7efa_452f_4f58_901c_3556264cc279.slice: Consumed 1.517s CPU time. May 17 00:38:34.139091 kubelet[2411]: I0517 00:38:34.139038 2411 reconciler_common.go:293] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a22d7efa-452f-4f58-901c-3556264cc279-calico-apiserver-certs\") on node \"ci-3510.3.7-n-cef16a74b5\" DevicePath \"\"" May 17 00:38:34.139091 kubelet[2411]: I0517 00:38:34.139081 2411 reconciler_common.go:293] "Volume detached for volume \"kube-api-access-hmk4g\" (UniqueName: \"kubernetes.io/projected/a22d7efa-452f-4f58-901c-3556264cc279-kube-api-access-hmk4g\") on node \"ci-3510.3.7-n-cef16a74b5\" DevicePath \"\"" May 17 00:38:34.560000 audit[5958]: NETFILTER_CFG table=filter:155 family=2 entries=12 op=nft_register_rule pid=5958 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:34.560000 audit[5958]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd39ab5e50 a2=0 a3=7ffd39ab5e3c items=0 ppid=2515 pid=5958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:34.560000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:34.566000 audit[5958]: NETFILTER_CFG table=nat:156 family=2 entries=36 op=nft_register_rule pid=5958 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:34.566000 audit[5958]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd39ab5e50 a2=0 a3=7ffd39ab5e3c items=0 ppid=2515 pid=5958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:34.566000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:34.602951 kubelet[2411]: I0517 00:38:34.602919 2411 scope.go:117] "RemoveContainer" containerID="09c62a61bb70f84d61b0e767d54f7ddb403e1c28a2e52eec58b8271315e6e69b" May 17 00:38:34.606318 env[1418]: time="2025-05-17T00:38:34.606228137Z" level=info msg="RemoveContainer for \"09c62a61bb70f84d61b0e767d54f7ddb403e1c28a2e52eec58b8271315e6e69b\"" May 17 00:38:34.619112 env[1418]: time="2025-05-17T00:38:34.619072149Z" level=info msg="RemoveContainer for \"09c62a61bb70f84d61b0e767d54f7ddb403e1c28a2e52eec58b8271315e6e69b\" returns successfully" May 17 00:38:36.087499 kubelet[2411]: I0517 00:38:36.087460 2411 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="a22d7efa-452f-4f58-901c-3556264cc279" path="/var/lib/kubelet/pods/a22d7efa-452f-4f58-901c-3556264cc279/volumes" May 17 00:38:41.106680 kernel: kauditd_printk_skb: 18 callbacks suppressed May 17 00:38:41.106894 kernel: audit: type=1400 audit(1747442321.082:1522): avc: denied { watch } for pid=4755 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_37_19.3293374513/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c193,c552 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c193,c552 tclass=file permissive=0 May 17 00:38:41.082000 audit[4755]: AVC avc: denied { watch } for pid=4755 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_37_19.3293374513/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c193,c552 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c193,c552 tclass=file permissive=0 May 17 00:38:41.082000 audit[4755]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002835180 a2=fc6 a3=0 items=0 ppid=4274 pid=4755 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c193,c552 key=(null) May 17 00:38:41.129782 kernel: audit: type=1300 audit(1747442321.082:1522): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002835180 a2=fc6 a3=0 items=0 ppid=4274 pid=4755 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c193,c552 key=(null) May 17 00:38:41.082000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:38:41.148797 kernel: audit: type=1327 audit(1747442321.082:1522): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:38:41.581000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:41.599785 kernel: audit: type=1400 audit(1747442321.581:1523): avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:41.599000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:41.599000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00039c660 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:38:41.639150 kernel: audit: type=1400 audit(1747442321.599:1524): avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:41.639328 kernel: audit: type=1300 audit(1747442321.599:1524): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00039c660 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:38:41.599000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:41.657790 kernel: audit: type=1327 audit(1747442321.599:1524): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:41.581000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ff16e0 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:38:41.581000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:41.698514 kernel: audit: type=1300 audit(1747442321.581:1523): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ff16e0 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:38:41.698673 kernel: audit: type=1327 audit(1747442321.581:1523): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:42.087177 kubelet[2411]: E0517 00:38:42.087138 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-55d4b57f4c-xrphf" podUID="a3dfc93e-f9da-4eec-b12c-30e9f327b06d" May 17 00:38:42.484000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:42.484000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c010e9ccf0 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:38:42.484000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:38:42.501777 kernel: audit: type=1400 audit(1747442322.484:1525): avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:42.505000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:42.505000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c012cb8e80 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:38:42.505000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:38:42.505000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:42.505000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00abfc4e0 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:38:42.505000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:38:42.506000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:42.506000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c010e9d0b0 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:38:42.506000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:38:42.548000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:42.548000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c012cb9dc0 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:38:42.548000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:38:42.548000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:42.548000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00abfd590 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:38:42.548000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:38:47.086219 kubelet[2411]: E0517 00:38:47.086046 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-shhph" podUID="6c0070f8-dd11-4a02-a60b-d807c5fc3160" May 17 00:38:48.896457 systemd[1]: run-containerd-runc-k8s.io-c2e8bb3ef54ff49b0802ffa399482a08c1c08acd49405db0c8bedf8b54a3e235-runc.WGhnvN.mount: Deactivated successfully. May 17 00:38:49.222954 kubelet[2411]: I0517 00:38:49.222751 2411 scope.go:117] "RemoveContainer" containerID="5820f70ee46a34b6867dba0f7794708f9b023f1fe207e4dc56167a2ed269b4c1" May 17 00:38:49.224463 env[1418]: time="2025-05-17T00:38:49.224418786Z" level=info msg="RemoveContainer for \"5820f70ee46a34b6867dba0f7794708f9b023f1fe207e4dc56167a2ed269b4c1\"" May 17 00:38:49.235365 env[1418]: time="2025-05-17T00:38:49.235321088Z" level=info msg="RemoveContainer for \"5820f70ee46a34b6867dba0f7794708f9b023f1fe207e4dc56167a2ed269b4c1\" returns successfully" May 17 00:38:49.236787 env[1418]: time="2025-05-17T00:38:49.236737188Z" level=info msg="StopPodSandbox for \"daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28\"" May 17 00:38:49.306252 env[1418]: 2025-05-17 00:38:49.276 [WARNING][5993] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:38:49.306252 env[1418]: 2025-05-17 00:38:49.276 [INFO][5993] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" May 17 00:38:49.306252 env[1418]: 2025-05-17 00:38:49.276 [INFO][5993] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" iface="eth0" netns="" May 17 00:38:49.306252 env[1418]: 2025-05-17 00:38:49.276 [INFO][5993] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" May 17 00:38:49.306252 env[1418]: 2025-05-17 00:38:49.276 [INFO][5993] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" May 17 00:38:49.306252 env[1418]: 2025-05-17 00:38:49.296 [INFO][6000] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" HandleID="k8s-pod-network.daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:38:49.306252 env[1418]: 2025-05-17 00:38:49.296 [INFO][6000] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:49.306252 env[1418]: 2025-05-17 00:38:49.297 [INFO][6000] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:49.306252 env[1418]: 2025-05-17 00:38:49.302 [WARNING][6000] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" HandleID="k8s-pod-network.daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:38:49.306252 env[1418]: 2025-05-17 00:38:49.302 [INFO][6000] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" HandleID="k8s-pod-network.daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:38:49.306252 env[1418]: 2025-05-17 00:38:49.304 [INFO][6000] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:49.306252 env[1418]: 2025-05-17 00:38:49.305 [INFO][5993] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" May 17 00:38:49.306890 env[1418]: time="2025-05-17T00:38:49.306287402Z" level=info msg="TearDown network for sandbox \"daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28\" successfully" May 17 00:38:49.306890 env[1418]: time="2025-05-17T00:38:49.306325902Z" level=info msg="StopPodSandbox for \"daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28\" returns successfully" May 17 00:38:49.307239 env[1418]: time="2025-05-17T00:38:49.307202602Z" level=info msg="RemovePodSandbox for \"daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28\"" May 17 00:38:49.307358 env[1418]: time="2025-05-17T00:38:49.307251502Z" level=info msg="Forcibly stopping sandbox \"daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28\"" May 17 00:38:49.375592 env[1418]: 2025-05-17 00:38:49.341 [WARNING][6015] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:38:49.375592 env[1418]: 2025-05-17 00:38:49.341 [INFO][6015] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" May 17 00:38:49.375592 env[1418]: 2025-05-17 00:38:49.341 [INFO][6015] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" iface="eth0" netns="" May 17 00:38:49.375592 env[1418]: 2025-05-17 00:38:49.341 [INFO][6015] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" May 17 00:38:49.375592 env[1418]: 2025-05-17 00:38:49.341 [INFO][6015] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" May 17 00:38:49.375592 env[1418]: 2025-05-17 00:38:49.364 [INFO][6023] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" HandleID="k8s-pod-network.daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:38:49.375592 env[1418]: 2025-05-17 00:38:49.364 [INFO][6023] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:49.375592 env[1418]: 2025-05-17 00:38:49.364 [INFO][6023] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:49.375592 env[1418]: 2025-05-17 00:38:49.371 [WARNING][6023] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" HandleID="k8s-pod-network.daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:38:49.375592 env[1418]: 2025-05-17 00:38:49.371 [INFO][6023] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" HandleID="k8s-pod-network.daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--c8j4r-eth0" May 17 00:38:49.375592 env[1418]: 2025-05-17 00:38:49.373 [INFO][6023] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:49.375592 env[1418]: 2025-05-17 00:38:49.374 [INFO][6015] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28" May 17 00:38:49.376263 env[1418]: time="2025-05-17T00:38:49.375632816Z" level=info msg="TearDown network for sandbox \"daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28\" successfully" May 17 00:38:49.385714 env[1418]: time="2025-05-17T00:38:49.385667918Z" level=info msg="RemovePodSandbox \"daf571fbc88b7d68034a8fb4b6d90188c63703b2eb618ae8bfa14b02ead47d28\" returns successfully" May 17 00:38:49.386462 env[1418]: time="2025-05-17T00:38:49.386431318Z" level=info msg="StopPodSandbox for \"f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f\"" May 17 00:38:49.401795 kernel: kauditd_printk_skb: 17 callbacks suppressed May 17 00:38:49.401929 kernel: audit: type=1400 audit(1747442329.390:1531): avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:49.390000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:49.390000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001084880 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:38:49.390000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:49.451419 kernel: audit: type=1300 audit(1747442329.390:1531): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001084880 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:38:49.451563 kernel: audit: type=1327 audit(1747442329.390:1531): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:49.390000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:49.390000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001084bc0 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:38:49.487861 kernel: audit: type=1400 audit(1747442329.390:1532): avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:49.488027 kernel: audit: type=1300 audit(1747442329.390:1532): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001084bc0 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:38:49.488061 kernel: audit: type=1327 audit(1747442329.390:1532): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:49.390000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:49.395000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:49.518839 kernel: audit: type=1400 audit(1747442329.395:1533): avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:49.395000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f31860 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:38:49.395000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:49.556520 kernel: audit: type=1300 audit(1747442329.395:1533): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f31860 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:38:49.557261 kernel: audit: type=1327 audit(1747442329.395:1533): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:49.557317 kernel: audit: type=1400 audit(1747442329.395:1534): avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:49.395000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:49.395000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001084f60 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:38:49.395000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:49.575103 env[1418]: 2025-05-17 00:38:49.504 [WARNING][6037] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:38:49.575103 env[1418]: 2025-05-17 00:38:49.505 [INFO][6037] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" May 17 00:38:49.575103 env[1418]: 2025-05-17 00:38:49.505 [INFO][6037] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" iface="eth0" netns="" May 17 00:38:49.575103 env[1418]: 2025-05-17 00:38:49.505 [INFO][6037] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" May 17 00:38:49.575103 env[1418]: 2025-05-17 00:38:49.505 [INFO][6037] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" May 17 00:38:49.575103 env[1418]: 2025-05-17 00:38:49.537 [INFO][6044] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" HandleID="k8s-pod-network.f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:38:49.575103 env[1418]: 2025-05-17 00:38:49.538 [INFO][6044] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:49.575103 env[1418]: 2025-05-17 00:38:49.538 [INFO][6044] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:49.575103 env[1418]: 2025-05-17 00:38:49.557 [WARNING][6044] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" HandleID="k8s-pod-network.f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:38:49.575103 env[1418]: 2025-05-17 00:38:49.558 [INFO][6044] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" HandleID="k8s-pod-network.f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:38:49.575103 env[1418]: 2025-05-17 00:38:49.572 [INFO][6044] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:49.575103 env[1418]: 2025-05-17 00:38:49.573 [INFO][6037] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" May 17 00:38:49.575678 env[1418]: time="2025-05-17T00:38:49.575151656Z" level=info msg="TearDown network for sandbox \"f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f\" successfully" May 17 00:38:49.575678 env[1418]: time="2025-05-17T00:38:49.575191556Z" level=info msg="StopPodSandbox for \"f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f\" returns successfully" May 17 00:38:49.575800 env[1418]: time="2025-05-17T00:38:49.575727156Z" level=info msg="RemovePodSandbox for \"f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f\"" May 17 00:38:49.575855 env[1418]: time="2025-05-17T00:38:49.575797056Z" level=info msg="Forcibly stopping sandbox \"f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f\"" May 17 00:38:49.647275 env[1418]: 2025-05-17 00:38:49.614 [WARNING][6058] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" WorkloadEndpoint="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:38:49.647275 env[1418]: 2025-05-17 00:38:49.614 [INFO][6058] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" May 17 00:38:49.647275 env[1418]: 2025-05-17 00:38:49.614 [INFO][6058] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" iface="eth0" netns="" May 17 00:38:49.647275 env[1418]: 2025-05-17 00:38:49.614 [INFO][6058] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" May 17 00:38:49.647275 env[1418]: 2025-05-17 00:38:49.614 [INFO][6058] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" May 17 00:38:49.647275 env[1418]: 2025-05-17 00:38:49.637 [INFO][6065] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" HandleID="k8s-pod-network.f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:38:49.647275 env[1418]: 2025-05-17 00:38:49.637 [INFO][6065] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:49.647275 env[1418]: 2025-05-17 00:38:49.637 [INFO][6065] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:49.647275 env[1418]: 2025-05-17 00:38:49.643 [WARNING][6065] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" HandleID="k8s-pod-network.f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:38:49.647275 env[1418]: 2025-05-17 00:38:49.643 [INFO][6065] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" HandleID="k8s-pod-network.f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" Workload="ci--3510.3.7--n--cef16a74b5-k8s-calico--apiserver--5c994b7d8--hgp4q-eth0" May 17 00:38:49.647275 env[1418]: 2025-05-17 00:38:49.645 [INFO][6065] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:49.647275 env[1418]: 2025-05-17 00:38:49.646 [INFO][6058] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f" May 17 00:38:49.647935 env[1418]: time="2025-05-17T00:38:49.647310870Z" level=info msg="TearDown network for sandbox \"f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f\" successfully" May 17 00:38:49.658226 env[1418]: time="2025-05-17T00:38:49.658181272Z" level=info msg="RemovePodSandbox \"f7d03c37a6c193e747067376f0c455b52cd2d7540d502577c6c5e59b58a39b9f\" returns successfully" May 17 00:38:49.871000 audit[5309]: AVC avc: denied { watch } for pid=5309 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_37_41.4073524260/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c693 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c586,c693 tclass=file permissive=0 May 17 00:38:49.871000 audit[5309]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001046360 a2=fc6 a3=0 items=0 ppid=5203 pid=5309 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c693 key=(null) May 17 00:38:49.871000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:38:53.086002 kubelet[2411]: E0517 00:38:53.085957 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-55d4b57f4c-xrphf" podUID="a3dfc93e-f9da-4eec-b12c-30e9f327b06d" May 17 00:38:58.085419 kubelet[2411]: E0517 00:38:58.085370 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-shhph" podUID="6c0070f8-dd11-4a02-a60b-d807c5fc3160" May 17 00:39:07.085638 env[1418]: time="2025-05-17T00:39:07.085583675Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:39:07.273896 env[1418]: time="2025-05-17T00:39:07.273828407Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:39:07.277554 env[1418]: time="2025-05-17T00:39:07.277500014Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:39:07.278376 kubelet[2411]: E0517 00:39:07.277855 2411 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:39:07.278376 kubelet[2411]: E0517 00:39:07.277919 2411 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:39:07.278376 kubelet[2411]: E0517 00:39:07.278050 2411 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:26dea4d59cac475bbf848f70692bf24a,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-z79vf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-55d4b57f4c-xrphf_calico-system(a3dfc93e-f9da-4eec-b12c-30e9f327b06d): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:39:07.280612 env[1418]: time="2025-05-17T00:39:07.280574219Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:39:07.454900 env[1418]: time="2025-05-17T00:39:07.454704027Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:39:07.458482 env[1418]: time="2025-05-17T00:39:07.458417734Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:39:07.458771 kubelet[2411]: E0517 00:39:07.458697 2411 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:39:07.458896 kubelet[2411]: E0517 00:39:07.458776 2411 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:39:07.458998 kubelet[2411]: E0517 00:39:07.458945 2411 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-z79vf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-55d4b57f4c-xrphf_calico-system(a3dfc93e-f9da-4eec-b12c-30e9f327b06d): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:39:07.460331 kubelet[2411]: E0517 00:39:07.460287 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-55d4b57f4c-xrphf" podUID="a3dfc93e-f9da-4eec-b12c-30e9f327b06d" May 17 00:39:08.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.4.20:22-10.200.16.10:43282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:08.212378 systemd[1]: Started sshd@7-10.200.4.20:22-10.200.16.10:43282.service. May 17 00:39:08.216992 kernel: kauditd_printk_skb: 5 callbacks suppressed May 17 00:39:08.217174 kernel: audit: type=1130 audit(1747442348.211:1536): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.4.20:22-10.200.16.10:43282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:08.804000 audit[6146]: USER_ACCT pid=6146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:08.805360 sshd[6146]: Accepted publickey for core from 10.200.16.10 port 43282 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:08.821822 kernel: audit: type=1101 audit(1747442348.804:1537): pid=6146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:08.821000 audit[6146]: CRED_ACQ pid=6146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:08.822917 sshd[6146]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:08.829011 systemd[1]: Started session-10.scope. May 17 00:39:08.830190 systemd-logind[1408]: New session 10 of user core. May 17 00:39:08.839259 kernel: audit: type=1103 audit(1747442348.821:1538): pid=6146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:08.839334 kernel: audit: type=1006 audit(1747442348.821:1539): pid=6146 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 17 00:39:08.821000 audit[6146]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed7666e00 a2=3 a3=0 items=0 ppid=1 pid=6146 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:08.863283 kernel: audit: type=1300 audit(1747442348.821:1539): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed7666e00 a2=3 a3=0 items=0 ppid=1 pid=6146 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:08.863369 kernel: audit: type=1327 audit(1747442348.821:1539): proctitle=737368643A20636F7265205B707269765D May 17 00:39:08.821000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:39:08.871790 kernel: audit: type=1105 audit(1747442348.836:1540): pid=6146 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:08.836000 audit[6146]: USER_START pid=6146 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:08.839000 audit[6148]: CRED_ACQ pid=6148 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:08.898228 kernel: audit: type=1103 audit(1747442348.839:1541): pid=6148 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:09.314735 sshd[6146]: pam_unix(sshd:session): session closed for user core May 17 00:39:09.315000 audit[6146]: USER_END pid=6146 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:09.317799 systemd[1]: sshd@7-10.200.4.20:22-10.200.16.10:43282.service: Deactivated successfully. May 17 00:39:09.318642 systemd[1]: session-10.scope: Deactivated successfully. May 17 00:39:09.320262 systemd-logind[1408]: Session 10 logged out. Waiting for processes to exit. May 17 00:39:09.321229 systemd-logind[1408]: Removed session 10. May 17 00:39:09.315000 audit[6146]: CRED_DISP pid=6146 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:09.334793 kernel: audit: type=1106 audit(1747442349.315:1542): pid=6146 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:09.334851 kernel: audit: type=1104 audit(1747442349.315:1543): pid=6146 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:09.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.4.20:22-10.200.16.10:43282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:12.087597 env[1418]: time="2025-05-17T00:39:12.087550383Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:39:12.267158 env[1418]: time="2025-05-17T00:39:12.267086566Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:39:12.270744 env[1418]: time="2025-05-17T00:39:12.270687973Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:39:12.270986 kubelet[2411]: E0517 00:39:12.270941 2411 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:39:12.271362 kubelet[2411]: E0517 00:39:12.271001 2411 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:39:12.271362 kubelet[2411]: E0517 00:39:12.271171 2411 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-jzznx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-shhph_calico-system(6c0070f8-dd11-4a02-a60b-d807c5fc3160): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:39:12.272797 kubelet[2411]: E0517 00:39:12.272724 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-shhph" podUID="6c0070f8-dd11-4a02-a60b-d807c5fc3160" May 17 00:39:14.440388 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:39:14.440533 kernel: audit: type=1130 audit(1747442354.418:1545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.4.20:22-10.200.16.10:39472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:14.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.4.20:22-10.200.16.10:39472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:14.418554 systemd[1]: Started sshd@8-10.200.4.20:22-10.200.16.10:39472.service. May 17 00:39:15.011000 audit[6160]: USER_ACCT pid=6160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:15.013997 sshd[6160]: Accepted publickey for core from 10.200.16.10 port 39472 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:15.029900 kernel: audit: type=1101 audit(1747442355.011:1546): pid=6160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:15.030963 sshd[6160]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:15.038040 systemd-logind[1408]: New session 11 of user core. May 17 00:39:15.038783 systemd[1]: Started session-11.scope. May 17 00:39:15.029000 audit[6160]: CRED_ACQ pid=6160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:15.059869 kernel: audit: type=1103 audit(1747442355.029:1547): pid=6160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:15.078830 kernel: audit: type=1006 audit(1747442355.029:1548): pid=6160 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 17 00:39:15.029000 audit[6160]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd20da6e70 a2=3 a3=0 items=0 ppid=1 pid=6160 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:15.100824 kernel: audit: type=1300 audit(1747442355.029:1548): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd20da6e70 a2=3 a3=0 items=0 ppid=1 pid=6160 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:15.029000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:39:15.114815 kernel: audit: type=1327 audit(1747442355.029:1548): proctitle=737368643A20636F7265205B707269765D May 17 00:39:15.062000 audit[6160]: USER_START pid=6160 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:15.136854 kernel: audit: type=1105 audit(1747442355.062:1549): pid=6160 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:15.064000 audit[6162]: CRED_ACQ pid=6162 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:15.160820 kernel: audit: type=1103 audit(1747442355.064:1550): pid=6162 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:15.503841 sshd[6160]: pam_unix(sshd:session): session closed for user core May 17 00:39:15.504000 audit[6160]: USER_END pid=6160 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:15.507546 systemd[1]: sshd@8-10.200.4.20:22-10.200.16.10:39472.service: Deactivated successfully. May 17 00:39:15.508527 systemd[1]: session-11.scope: Deactivated successfully. May 17 00:39:15.510400 systemd-logind[1408]: Session 11 logged out. Waiting for processes to exit. May 17 00:39:15.511355 systemd-logind[1408]: Removed session 11. May 17 00:39:15.504000 audit[6160]: CRED_DISP pid=6160 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:15.537155 kernel: audit: type=1106 audit(1747442355.504:1551): pid=6160 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:15.537278 kernel: audit: type=1104 audit(1747442355.504:1552): pid=6160 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:15.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.4.20:22-10.200.16.10:39472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:18.892154 systemd[1]: run-containerd-runc-k8s.io-c2e8bb3ef54ff49b0802ffa399482a08c1c08acd49405db0c8bedf8b54a3e235-runc.Lrcdng.mount: Deactivated successfully. May 17 00:39:19.086466 kubelet[2411]: E0517 00:39:19.086387 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-55d4b57f4c-xrphf" podUID="a3dfc93e-f9da-4eec-b12c-30e9f327b06d" May 17 00:39:20.605580 systemd[1]: Started sshd@9-10.200.4.20:22-10.200.16.10:56364.service. May 17 00:39:20.616532 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:39:20.616570 kernel: audit: type=1130 audit(1747442360.605:1554): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.4.20:22-10.200.16.10:56364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:20.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.4.20:22-10.200.16.10:56364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:21.196000 audit[6192]: USER_ACCT pid=6192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:21.215061 sshd[6192]: Accepted publickey for core from 10.200.16.10 port 56364 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:21.215573 sshd[6192]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:21.215864 kernel: audit: type=1101 audit(1747442361.196:1555): pid=6192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:21.214000 audit[6192]: CRED_ACQ pid=6192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:21.224339 systemd[1]: Started session-12.scope. May 17 00:39:21.225509 systemd-logind[1408]: New session 12 of user core. May 17 00:39:21.233985 kernel: audit: type=1103 audit(1747442361.214:1556): pid=6192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:21.234059 kernel: audit: type=1006 audit(1747442361.214:1557): pid=6192 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 17 00:39:21.214000 audit[6192]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc37162db0 a2=3 a3=0 items=0 ppid=1 pid=6192 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:21.241850 kernel: audit: type=1300 audit(1747442361.214:1557): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc37162db0 a2=3 a3=0 items=0 ppid=1 pid=6192 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:21.214000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:39:21.261981 kernel: audit: type=1327 audit(1747442361.214:1557): proctitle=737368643A20636F7265205B707269765D May 17 00:39:21.262066 kernel: audit: type=1105 audit(1747442361.230:1558): pid=6192 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:21.230000 audit[6192]: USER_START pid=6192 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:21.231000 audit[6194]: CRED_ACQ pid=6194 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:21.292408 kernel: audit: type=1103 audit(1747442361.231:1559): pid=6194 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:21.699018 sshd[6192]: pam_unix(sshd:session): session closed for user core May 17 00:39:21.700000 audit[6192]: USER_END pid=6192 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:21.711942 systemd[1]: sshd@9-10.200.4.20:22-10.200.16.10:56364.service: Deactivated successfully. May 17 00:39:21.713711 systemd-logind[1408]: Session 12 logged out. Waiting for processes to exit. May 17 00:39:21.719694 systemd[1]: session-12.scope: Deactivated successfully. May 17 00:39:21.719844 kernel: audit: type=1106 audit(1747442361.700:1560): pid=6192 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:21.700000 audit[6192]: CRED_DISP pid=6192 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:21.721313 systemd-logind[1408]: Removed session 12. May 17 00:39:21.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.4.20:22-10.200.16.10:56364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:21.735938 kernel: audit: type=1104 audit(1747442361.700:1561): pid=6192 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:26.763517 systemd[1]: run-containerd-runc-k8s.io-0c2f6a779a69fabb45cb2e90f43be91e3f28598b97e15cf715be17755c276045-runc.wvIXSz.mount: Deactivated successfully. May 17 00:39:26.806556 systemd[1]: Started sshd@10-10.200.4.20:22-10.200.16.10:56378.service. May 17 00:39:26.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.4.20:22-10.200.16.10:56378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:26.817210 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:39:26.817282 kernel: audit: type=1130 audit(1747442366.812:1563): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.4.20:22-10.200.16.10:56378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:27.085463 kubelet[2411]: E0517 00:39:27.085411 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-shhph" podUID="6c0070f8-dd11-4a02-a60b-d807c5fc3160" May 17 00:39:27.416000 audit[6229]: USER_ACCT pid=6229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:27.418265 sshd[6229]: Accepted publickey for core from 10.200.16.10 port 56378 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:27.433804 kernel: audit: type=1101 audit(1747442367.416:1564): pid=6229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:27.433000 audit[6229]: CRED_ACQ pid=6229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:27.434627 sshd[6229]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:27.440295 systemd[1]: Started session-13.scope. May 17 00:39:27.441432 systemd-logind[1408]: New session 13 of user core. May 17 00:39:27.459394 kernel: audit: type=1103 audit(1747442367.433:1565): pid=6229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:27.459503 kernel: audit: type=1006 audit(1747442367.433:1566): pid=6229 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 17 00:39:27.433000 audit[6229]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe14f6f540 a2=3 a3=0 items=0 ppid=1 pid=6229 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:27.474932 kernel: audit: type=1300 audit(1747442367.433:1566): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe14f6f540 a2=3 a3=0 items=0 ppid=1 pid=6229 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:27.475022 kernel: audit: type=1327 audit(1747442367.433:1566): proctitle=737368643A20636F7265205B707269765D May 17 00:39:27.433000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:39:27.480833 kernel: audit: type=1105 audit(1747442367.447:1567): pid=6229 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:27.447000 audit[6229]: USER_START pid=6229 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:27.449000 audit[6231]: CRED_ACQ pid=6231 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:27.509743 kernel: audit: type=1103 audit(1747442367.449:1568): pid=6231 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:27.904873 sshd[6229]: pam_unix(sshd:session): session closed for user core May 17 00:39:27.905000 audit[6229]: USER_END pid=6229 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:27.908520 systemd[1]: sshd@10-10.200.4.20:22-10.200.16.10:56378.service: Deactivated successfully. May 17 00:39:27.909371 systemd[1]: session-13.scope: Deactivated successfully. May 17 00:39:27.910737 systemd-logind[1408]: Session 13 logged out. Waiting for processes to exit. May 17 00:39:27.911689 systemd-logind[1408]: Removed session 13. May 17 00:39:27.905000 audit[6229]: CRED_DISP pid=6229 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:27.923784 kernel: audit: type=1106 audit(1747442367.905:1569): pid=6229 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:27.923834 kernel: audit: type=1104 audit(1747442367.905:1570): pid=6229 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:27.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.4.20:22-10.200.16.10:56378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:28.005341 systemd[1]: Started sshd@11-10.200.4.20:22-10.200.16.10:56382.service. May 17 00:39:28.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.4.20:22-10.200.16.10:56382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:28.591000 audit[6242]: USER_ACCT pid=6242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:28.592180 sshd[6242]: Accepted publickey for core from 10.200.16.10 port 56382 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:28.592000 audit[6242]: CRED_ACQ pid=6242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:28.592000 audit[6242]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8b5020a0 a2=3 a3=0 items=0 ppid=1 pid=6242 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:28.592000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:39:28.593613 sshd[6242]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:28.598541 systemd-logind[1408]: New session 14 of user core. May 17 00:39:28.599078 systemd[1]: Started session-14.scope. May 17 00:39:28.603000 audit[6242]: USER_START pid=6242 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:28.605000 audit[6244]: CRED_ACQ pid=6244 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:29.113460 sshd[6242]: pam_unix(sshd:session): session closed for user core May 17 00:39:29.114000 audit[6242]: USER_END pid=6242 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:29.114000 audit[6242]: CRED_DISP pid=6242 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:29.117038 systemd[1]: sshd@11-10.200.4.20:22-10.200.16.10:56382.service: Deactivated successfully. May 17 00:39:29.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.4.20:22-10.200.16.10:56382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:29.118282 systemd[1]: session-14.scope: Deactivated successfully. May 17 00:39:29.119325 systemd-logind[1408]: Session 14 logged out. Waiting for processes to exit. May 17 00:39:29.120249 systemd-logind[1408]: Removed session 14. May 17 00:39:29.211954 systemd[1]: Started sshd@12-10.200.4.20:22-10.200.16.10:38884.service. May 17 00:39:29.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.4.20:22-10.200.16.10:38884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:29.793000 audit[6252]: USER_ACCT pid=6252 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:29.794509 sshd[6252]: Accepted publickey for core from 10.200.16.10 port 38884 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:29.794000 audit[6252]: CRED_ACQ pid=6252 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:29.794000 audit[6252]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb08fe3f0 a2=3 a3=0 items=0 ppid=1 pid=6252 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:29.794000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:39:29.795998 sshd[6252]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:29.801310 systemd[1]: Started session-15.scope. May 17 00:39:29.801785 systemd-logind[1408]: New session 15 of user core. May 17 00:39:29.806000 audit[6252]: USER_START pid=6252 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:29.807000 audit[6254]: CRED_ACQ pid=6254 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:30.277345 sshd[6252]: pam_unix(sshd:session): session closed for user core May 17 00:39:30.278000 audit[6252]: USER_END pid=6252 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:30.278000 audit[6252]: CRED_DISP pid=6252 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:30.280467 systemd[1]: sshd@12-10.200.4.20:22-10.200.16.10:38884.service: Deactivated successfully. May 17 00:39:30.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.4.20:22-10.200.16.10:38884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:30.281510 systemd[1]: session-15.scope: Deactivated successfully. May 17 00:39:30.282300 systemd-logind[1408]: Session 15 logged out. Waiting for processes to exit. May 17 00:39:30.283157 systemd-logind[1408]: Removed session 15. May 17 00:39:33.086462 kubelet[2411]: E0517 00:39:33.086363 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-55d4b57f4c-xrphf" podUID="a3dfc93e-f9da-4eec-b12c-30e9f327b06d" May 17 00:39:35.377939 systemd[1]: Started sshd@13-10.200.4.20:22-10.200.16.10:38888.service. May 17 00:39:35.398886 kernel: kauditd_printk_skb: 23 callbacks suppressed May 17 00:39:35.399020 kernel: audit: type=1130 audit(1747442375.377:1590): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.4.20:22-10.200.16.10:38888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:35.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.4.20:22-10.200.16.10:38888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:35.961000 audit[6269]: USER_ACCT pid=6269 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:35.980846 kernel: audit: type=1101 audit(1747442375.961:1591): pid=6269 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:35.965130 sshd[6269]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:35.981223 sshd[6269]: Accepted publickey for core from 10.200.16.10 port 38888 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:35.962000 audit[6269]: CRED_ACQ pid=6269 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:35.986104 systemd[1]: Started session-16.scope. May 17 00:39:35.987172 systemd-logind[1408]: New session 16 of user core. May 17 00:39:36.006278 kernel: audit: type=1103 audit(1747442375.962:1592): pid=6269 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:36.006399 kernel: audit: type=1006 audit(1747442375.963:1593): pid=6269 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 17 00:39:35.963000 audit[6269]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe41b1cc00 a2=3 a3=0 items=0 ppid=1 pid=6269 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:36.022934 kernel: audit: type=1300 audit(1747442375.963:1593): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe41b1cc00 a2=3 a3=0 items=0 ppid=1 pid=6269 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:36.023016 kernel: audit: type=1327 audit(1747442375.963:1593): proctitle=737368643A20636F7265205B707269765D May 17 00:39:35.963000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:39:35.991000 audit[6269]: USER_START pid=6269 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:36.043648 kernel: audit: type=1105 audit(1747442375.991:1594): pid=6269 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:36.043802 kernel: audit: type=1103 audit(1747442375.993:1595): pid=6271 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:35.993000 audit[6271]: CRED_ACQ pid=6271 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:36.448072 sshd[6269]: pam_unix(sshd:session): session closed for user core May 17 00:39:36.448000 audit[6269]: USER_END pid=6269 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:36.452122 systemd[1]: sshd@13-10.200.4.20:22-10.200.16.10:38888.service: Deactivated successfully. May 17 00:39:36.453151 systemd[1]: session-16.scope: Deactivated successfully. May 17 00:39:36.454685 systemd-logind[1408]: Session 16 logged out. Waiting for processes to exit. May 17 00:39:36.455609 systemd-logind[1408]: Removed session 16. May 17 00:39:36.448000 audit[6269]: CRED_DISP pid=6269 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:36.480394 kernel: audit: type=1106 audit(1747442376.448:1596): pid=6269 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:36.480480 kernel: audit: type=1104 audit(1747442376.448:1597): pid=6269 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:36.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.4.20:22-10.200.16.10:38888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.133000 audit[4755]: AVC avc: denied { watch } for pid=4755 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_37_19.3293374513/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c193,c552 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c193,c552 tclass=file permissive=0 May 17 00:39:41.139364 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:39:41.139482 kernel: audit: type=1400 audit(1747442381.133:1599): avc: denied { watch } for pid=4755 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_37_19.3293374513/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c193,c552 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c193,c552 tclass=file permissive=0 May 17 00:39:41.133000 audit[4755]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002835ec0 a2=fc6 a3=0 items=0 ppid=4274 pid=4755 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c193,c552 key=(null) May 17 00:39:41.186790 kernel: audit: type=1300 audit(1747442381.133:1599): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002835ec0 a2=fc6 a3=0 items=0 ppid=4274 pid=4755 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c193,c552 key=(null) May 17 00:39:41.133000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:39:41.210788 kernel: audit: type=1327 audit(1747442381.133:1599): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:39:41.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.4.20:22-10.200.16.10:55628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.548629 systemd[1]: Started sshd@14-10.200.4.20:22-10.200.16.10:55628.service. May 17 00:39:41.565835 kernel: audit: type=1130 audit(1747442381.547:1600): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.4.20:22-10.200.16.10:55628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.599000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:41.619861 kernel: audit: type=1400 audit(1747442381.599:1601): avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:41.599000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00308da20 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:39:41.648774 kernel: audit: type=1300 audit(1747442381.599:1601): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00308da20 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:39:41.648895 kernel: audit: type=1327 audit(1747442381.599:1601): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:39:41.599000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:39:41.618000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:41.682565 kernel: audit: type=1400 audit(1747442381.618:1602): avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:41.682686 kernel: audit: type=1300 audit(1747442381.618:1602): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00198c510 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:39:41.618000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00198c510 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:39:41.618000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:39:41.723787 kernel: audit: type=1327 audit(1747442381.618:1602): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:39:42.086972 kubelet[2411]: E0517 00:39:42.086927 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-shhph" podUID="6c0070f8-dd11-4a02-a60b-d807c5fc3160" May 17 00:39:42.142000 sshd[6281]: Accepted publickey for core from 10.200.16.10 port 55628 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:42.143860 sshd[6281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:42.140000 audit[6281]: USER_ACCT pid=6281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:42.141000 audit[6281]: CRED_ACQ pid=6281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:42.141000 audit[6281]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3c9c2110 a2=3 a3=0 items=0 ppid=1 pid=6281 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:42.141000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:39:42.151438 systemd-logind[1408]: New session 17 of user core. May 17 00:39:42.152504 systemd[1]: Started session-17.scope. May 17 00:39:42.157000 audit[6281]: USER_START pid=6281 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:42.159000 audit[6283]: CRED_ACQ pid=6283 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:42.486000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:42.486000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c00ad43710 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:39:42.486000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:39:42.514000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:42.514000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c0105d66c0 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:39:42.514000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:39:42.514000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:42.514000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c0105d66f0 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:39:42.514000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:39:42.514000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:42.514000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c0058aa0e0 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:39:42.514000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:39:42.548000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:42.548000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c012f76a00 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:39:42.548000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:39:42.548000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:42.548000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c00e665380 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:39:42.548000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:39:42.689558 sshd[6281]: pam_unix(sshd:session): session closed for user core May 17 00:39:42.689000 audit[6281]: USER_END pid=6281 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:42.689000 audit[6281]: CRED_DISP pid=6281 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:42.693598 systemd-logind[1408]: Session 17 logged out. Waiting for processes to exit. May 17 00:39:42.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.4.20:22-10.200.16.10:55628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.695409 systemd[1]: sshd@14-10.200.4.20:22-10.200.16.10:55628.service: Deactivated successfully. May 17 00:39:42.696440 systemd[1]: session-17.scope: Deactivated successfully. May 17 00:39:42.698486 systemd-logind[1408]: Removed session 17. May 17 00:39:47.085517 kubelet[2411]: E0517 00:39:47.085464 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-55d4b57f4c-xrphf" podUID="a3dfc93e-f9da-4eec-b12c-30e9f327b06d" May 17 00:39:47.790176 systemd[1]: Started sshd@15-10.200.4.20:22-10.200.16.10:55638.service. May 17 00:39:47.811176 kernel: kauditd_printk_skb: 28 callbacks suppressed May 17 00:39:47.811327 kernel: audit: type=1130 audit(1747442387.789:1617): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.4.20:22-10.200.16.10:55638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:47.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.4.20:22-10.200.16.10:55638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:48.375000 audit[6294]: USER_ACCT pid=6294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.395503 sshd[6294]: Accepted publickey for core from 10.200.16.10 port 55638 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:48.395880 kernel: audit: type=1101 audit(1747442388.375:1618): pid=6294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.395957 sshd[6294]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:48.393000 audit[6294]: CRED_ACQ pid=6294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.401235 systemd[1]: Started session-18.scope. May 17 00:39:48.402271 systemd-logind[1408]: New session 18 of user core. May 17 00:39:48.412789 kernel: audit: type=1103 audit(1747442388.393:1619): pid=6294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.423873 kernel: audit: type=1006 audit(1747442388.393:1620): pid=6294 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 17 00:39:48.393000 audit[6294]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf17aad50 a2=3 a3=0 items=0 ppid=1 pid=6294 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.393000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:39:48.444518 kernel: audit: type=1300 audit(1747442388.393:1620): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf17aad50 a2=3 a3=0 items=0 ppid=1 pid=6294 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.444620 kernel: audit: type=1327 audit(1747442388.393:1620): proctitle=737368643A20636F7265205B707269765D May 17 00:39:48.444659 kernel: audit: type=1105 audit(1747442388.407:1621): pid=6294 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.407000 audit[6294]: USER_START pid=6294 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.412000 audit[6296]: CRED_ACQ pid=6296 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.461811 kernel: audit: type=1103 audit(1747442388.412:1622): pid=6296 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.869036 sshd[6294]: pam_unix(sshd:session): session closed for user core May 17 00:39:48.869000 audit[6294]: USER_END pid=6294 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.876889 systemd[1]: sshd@15-10.200.4.20:22-10.200.16.10:55638.service: Deactivated successfully. May 17 00:39:48.877860 systemd[1]: session-18.scope: Deactivated successfully. May 17 00:39:48.879373 systemd-logind[1408]: Session 18 logged out. Waiting for processes to exit. May 17 00:39:48.880506 systemd-logind[1408]: Removed session 18. May 17 00:39:48.870000 audit[6294]: CRED_DISP pid=6294 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.907455 kernel: audit: type=1106 audit(1747442388.869:1623): pid=6294 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.907588 kernel: audit: type=1104 audit(1747442388.870:1624): pid=6294 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.4.20:22-10.200.16.10:55638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:48.913991 systemd[1]: run-containerd-runc-k8s.io-c2e8bb3ef54ff49b0802ffa399482a08c1c08acd49405db0c8bedf8b54a3e235-runc.kIbO8X.mount: Deactivated successfully. May 17 00:39:49.391000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:49.391000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:49.391000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00342c3a0 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:39:49.391000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:39:49.391000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0033c2a80 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:39:49.391000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:39:49.395000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:49.395000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:49.395000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0033c2da0 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:39:49.395000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:39:49.395000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00342c3c0 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:39:49.395000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:39:49.871000 audit[5309]: AVC avc: denied { watch } for pid=5309 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_37_41.4073524260/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c693 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c586,c693 tclass=file permissive=0 May 17 00:39:49.871000 audit[5309]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0010464a0 a2=fc6 a3=0 items=0 ppid=5203 pid=5309 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c693 key=(null) May 17 00:39:49.871000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:39:53.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.4.20:22-10.200.16.10:50620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:53.968474 systemd[1]: Started sshd@16-10.200.4.20:22-10.200.16.10:50620.service. May 17 00:39:53.973298 kernel: kauditd_printk_skb: 16 callbacks suppressed May 17 00:39:53.973396 kernel: audit: type=1130 audit(1747442393.966:1631): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.4.20:22-10.200.16.10:50620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:54.085194 kubelet[2411]: E0517 00:39:54.084796 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-shhph" podUID="6c0070f8-dd11-4a02-a60b-d807c5fc3160" May 17 00:39:54.550000 audit[6328]: USER_ACCT pid=6328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:54.552646 sshd[6328]: Accepted publickey for core from 10.200.16.10 port 50620 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:54.568000 audit[6328]: CRED_ACQ pid=6328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:54.570950 sshd[6328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:54.576631 systemd[1]: Started session-19.scope. May 17 00:39:54.577523 systemd-logind[1408]: New session 19 of user core. May 17 00:39:54.588161 kernel: audit: type=1101 audit(1747442394.550:1632): pid=6328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:54.588261 kernel: audit: type=1103 audit(1747442394.568:1633): pid=6328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:54.588286 kernel: audit: type=1006 audit(1747442394.568:1634): pid=6328 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 May 17 00:39:54.568000 audit[6328]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd21b0230 a2=3 a3=0 items=0 ppid=1 pid=6328 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:54.612213 kernel: audit: type=1300 audit(1747442394.568:1634): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd21b0230 a2=3 a3=0 items=0 ppid=1 pid=6328 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:54.568000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:39:54.617877 kernel: audit: type=1327 audit(1747442394.568:1634): proctitle=737368643A20636F7265205B707269765D May 17 00:39:54.582000 audit[6328]: USER_START pid=6328 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:54.618772 kernel: audit: type=1105 audit(1747442394.582:1635): pid=6328 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:54.588000 audit[6330]: CRED_ACQ pid=6330 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:54.634809 kernel: audit: type=1103 audit(1747442394.588:1636): pid=6330 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:55.049405 sshd[6328]: pam_unix(sshd:session): session closed for user core May 17 00:39:55.049000 audit[6328]: USER_END pid=6328 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:55.053164 systemd[1]: sshd@16-10.200.4.20:22-10.200.16.10:50620.service: Deactivated successfully. May 17 00:39:55.054019 systemd[1]: session-19.scope: Deactivated successfully. May 17 00:39:55.055622 systemd-logind[1408]: Session 19 logged out. Waiting for processes to exit. May 17 00:39:55.056655 systemd-logind[1408]: Removed session 19. May 17 00:39:55.049000 audit[6328]: CRED_DISP pid=6328 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:55.082646 kernel: audit: type=1106 audit(1747442395.049:1637): pid=6328 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:55.082918 kernel: audit: type=1104 audit(1747442395.049:1638): pid=6328 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:55.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.4.20:22-10.200.16.10:50620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:55.148472 systemd[1]: Started sshd@17-10.200.4.20:22-10.200.16.10:50634.service. May 17 00:39:55.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.4.20:22-10.200.16.10:50634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:55.729000 audit[6340]: USER_ACCT pid=6340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:55.731852 sshd[6340]: Accepted publickey for core from 10.200.16.10 port 50634 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:55.731000 audit[6340]: CRED_ACQ pid=6340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:55.731000 audit[6340]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcae5ed1f0 a2=3 a3=0 items=0 ppid=1 pid=6340 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:55.731000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:39:55.733683 sshd[6340]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:55.738914 systemd[1]: Started session-20.scope. May 17 00:39:55.739571 systemd-logind[1408]: New session 20 of user core. May 17 00:39:55.742000 audit[6340]: USER_START pid=6340 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:55.744000 audit[6342]: CRED_ACQ pid=6342 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:56.250437 sshd[6340]: pam_unix(sshd:session): session closed for user core May 17 00:39:56.250000 audit[6340]: USER_END pid=6340 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:56.250000 audit[6340]: CRED_DISP pid=6340 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:56.253596 systemd[1]: sshd@17-10.200.4.20:22-10.200.16.10:50634.service: Deactivated successfully. May 17 00:39:56.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.4.20:22-10.200.16.10:50634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:56.254694 systemd[1]: session-20.scope: Deactivated successfully. May 17 00:39:56.255368 systemd-logind[1408]: Session 20 logged out. Waiting for processes to exit. May 17 00:39:56.256243 systemd-logind[1408]: Removed session 20. May 17 00:39:56.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.4.20:22-10.200.16.10:50650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:56.350219 systemd[1]: Started sshd@18-10.200.4.20:22-10.200.16.10:50650.service. May 17 00:39:56.761492 systemd[1]: run-containerd-runc-k8s.io-0c2f6a779a69fabb45cb2e90f43be91e3f28598b97e15cf715be17755c276045-runc.aGfweJ.mount: Deactivated successfully. May 17 00:39:56.936000 audit[6350]: USER_ACCT pid=6350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:56.938752 sshd[6350]: Accepted publickey for core from 10.200.16.10 port 50650 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:56.938000 audit[6350]: CRED_ACQ pid=6350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:56.938000 audit[6350]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8bc0af50 a2=3 a3=0 items=0 ppid=1 pid=6350 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:56.938000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:39:56.940264 sshd[6350]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:56.945354 systemd[1]: Started session-21.scope. May 17 00:39:56.945847 systemd-logind[1408]: New session 21 of user core. May 17 00:39:56.949000 audit[6350]: USER_START pid=6350 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:56.950000 audit[6374]: CRED_ACQ pid=6374 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:58.088500 kubelet[2411]: E0517 00:39:58.088445 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-55d4b57f4c-xrphf" podUID="a3dfc93e-f9da-4eec-b12c-30e9f327b06d" May 17 00:39:59.281000 audit[6384]: NETFILTER_CFG table=filter:157 family=2 entries=12 op=nft_register_rule pid=6384 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:39:59.291220 kernel: kauditd_printk_skb: 20 callbacks suppressed May 17 00:39:59.291367 kernel: audit: type=1325 audit(1747442399.281:1655): table=filter:157 family=2 entries=12 op=nft_register_rule pid=6384 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:39:59.281000 audit[6384]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe90291640 a2=0 a3=7ffe9029162c items=0 ppid=2515 pid=6384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:59.316849 kernel: audit: type=1300 audit(1747442399.281:1655): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe90291640 a2=0 a3=7ffe9029162c items=0 ppid=2515 pid=6384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:59.318409 kernel: audit: type=1327 audit(1747442399.281:1655): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:39:59.281000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:39:59.322000 audit[6384]: NETFILTER_CFG table=nat:158 family=2 entries=22 op=nft_register_rule pid=6384 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:39:59.338555 kernel: audit: type=1325 audit(1747442399.322:1656): table=nat:158 family=2 entries=22 op=nft_register_rule pid=6384 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:39:59.322000 audit[6384]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe90291640 a2=0 a3=7ffe9029162c items=0 ppid=2515 pid=6384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:59.356774 kernel: audit: type=1300 audit(1747442399.322:1656): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe90291640 a2=0 a3=7ffe9029162c items=0 ppid=2515 pid=6384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:59.322000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:39:59.365788 kernel: audit: type=1327 audit(1747442399.322:1656): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:39:59.337000 audit[6386]: NETFILTER_CFG table=filter:159 family=2 entries=24 op=nft_register_rule pid=6386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:39:59.337000 audit[6386]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffdec6b1b60 a2=0 a3=7ffdec6b1b4c items=0 ppid=2515 pid=6386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:59.392976 kernel: audit: type=1325 audit(1747442399.337:1657): table=filter:159 family=2 entries=24 op=nft_register_rule pid=6386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:39:59.393139 kernel: audit: type=1300 audit(1747442399.337:1657): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffdec6b1b60 a2=0 a3=7ffdec6b1b4c items=0 ppid=2515 pid=6386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:59.393172 kernel: audit: type=1327 audit(1747442399.337:1657): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:39:59.337000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:39:59.364000 audit[6386]: NETFILTER_CFG table=nat:160 family=2 entries=22 op=nft_register_rule pid=6386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:39:59.414123 kernel: audit: type=1325 audit(1747442399.364:1658): table=nat:160 family=2 entries=22 op=nft_register_rule pid=6386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:39:59.364000 audit[6386]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdec6b1b60 a2=0 a3=0 items=0 ppid=2515 pid=6386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:59.364000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:39:59.427675 sshd[6350]: pam_unix(sshd:session): session closed for user core May 17 00:39:59.427000 audit[6350]: USER_END pid=6350 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:59.427000 audit[6350]: CRED_DISP pid=6350 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:59.430818 systemd[1]: sshd@18-10.200.4.20:22-10.200.16.10:50650.service: Deactivated successfully. May 17 00:39:59.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.4.20:22-10.200.16.10:50650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:59.431741 systemd[1]: session-21.scope: Deactivated successfully. May 17 00:39:59.432956 systemd-logind[1408]: Session 21 logged out. Waiting for processes to exit. May 17 00:39:59.433876 systemd-logind[1408]: Removed session 21. May 17 00:39:59.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.4.20:22-10.200.16.10:44466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:59.531573 systemd[1]: Started sshd@19-10.200.4.20:22-10.200.16.10:44466.service. May 17 00:40:00.119826 sshd[6389]: Accepted publickey for core from 10.200.16.10 port 44466 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:00.120506 sshd[6389]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:00.117000 audit[6389]: USER_ACCT pid=6389 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:00.118000 audit[6389]: CRED_ACQ pid=6389 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:00.118000 audit[6389]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc59d97950 a2=3 a3=0 items=0 ppid=1 pid=6389 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:00.118000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:00.127867 systemd-logind[1408]: New session 22 of user core. May 17 00:40:00.128504 systemd[1]: Started session-22.scope. May 17 00:40:00.136000 audit[6389]: USER_START pid=6389 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:00.138000 audit[6391]: CRED_ACQ pid=6391 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:00.935315 sshd[6389]: pam_unix(sshd:session): session closed for user core May 17 00:40:00.934000 audit[6389]: USER_END pid=6389 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:00.935000 audit[6389]: CRED_DISP pid=6389 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:00.939013 systemd-logind[1408]: Session 22 logged out. Waiting for processes to exit. May 17 00:40:00.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.4.20:22-10.200.16.10:44466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:00.940923 systemd[1]: sshd@19-10.200.4.20:22-10.200.16.10:44466.service: Deactivated successfully. May 17 00:40:00.941952 systemd[1]: session-22.scope: Deactivated successfully. May 17 00:40:00.944133 systemd-logind[1408]: Removed session 22. May 17 00:40:01.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.4.20:22-10.200.16.10:44468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:01.040901 systemd[1]: Started sshd@20-10.200.4.20:22-10.200.16.10:44468.service. May 17 00:40:01.625000 audit[6399]: USER_ACCT pid=6399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:01.628243 sshd[6399]: Accepted publickey for core from 10.200.16.10 port 44468 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:01.626000 audit[6399]: CRED_ACQ pid=6399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:01.626000 audit[6399]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1880c960 a2=3 a3=0 items=0 ppid=1 pid=6399 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:01.626000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:01.628919 sshd[6399]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:01.635156 systemd-logind[1408]: New session 23 of user core. May 17 00:40:01.635861 systemd[1]: Started session-23.scope. May 17 00:40:01.640000 audit[6399]: USER_START pid=6399 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:01.642000 audit[6401]: CRED_ACQ pid=6401 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:02.163517 sshd[6399]: pam_unix(sshd:session): session closed for user core May 17 00:40:02.162000 audit[6399]: USER_END pid=6399 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:02.163000 audit[6399]: CRED_DISP pid=6399 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:02.167558 systemd-logind[1408]: Session 23 logged out. Waiting for processes to exit. May 17 00:40:02.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.4.20:22-10.200.16.10:44468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:02.169685 systemd[1]: sshd@20-10.200.4.20:22-10.200.16.10:44468.service: Deactivated successfully. May 17 00:40:02.170791 systemd[1]: session-23.scope: Deactivated successfully. May 17 00:40:02.173014 systemd-logind[1408]: Removed session 23. May 17 00:40:07.085575 kubelet[2411]: E0517 00:40:07.085527 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-shhph" podUID="6c0070f8-dd11-4a02-a60b-d807c5fc3160" May 17 00:40:07.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.4.20:22-10.200.16.10:44476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:07.261898 systemd[1]: Started sshd@21-10.200.4.20:22-10.200.16.10:44476.service. May 17 00:40:07.281970 kernel: kauditd_printk_skb: 27 callbacks suppressed May 17 00:40:07.282060 kernel: audit: type=1130 audit(1747442407.260:1680): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.4.20:22-10.200.16.10:44476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:07.848000 audit[6431]: USER_ACCT pid=6431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:07.850681 sshd[6431]: Accepted publickey for core from 10.200.16.10 port 44476 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:07.865000 audit[6431]: CRED_ACQ pid=6431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:07.868155 sshd[6431]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:07.879593 systemd-logind[1408]: New session 24 of user core. May 17 00:40:07.880251 systemd[1]: Started session-24.scope. May 17 00:40:07.883585 kernel: audit: type=1101 audit(1747442407.848:1681): pid=6431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:07.883690 kernel: audit: type=1103 audit(1747442407.865:1682): pid=6431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:07.894815 kernel: audit: type=1006 audit(1747442407.865:1683): pid=6431 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 17 00:40:07.865000 audit[6431]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4560f3f0 a2=3 a3=0 items=0 ppid=1 pid=6431 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:07.911777 kernel: audit: type=1300 audit(1747442407.865:1683): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4560f3f0 a2=3 a3=0 items=0 ppid=1 pid=6431 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:07.911858 kernel: audit: type=1327 audit(1747442407.865:1683): proctitle=737368643A20636F7265205B707269765D May 17 00:40:07.865000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:07.886000 audit[6431]: USER_START pid=6431 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:07.931854 kernel: audit: type=1105 audit(1747442407.886:1684): pid=6431 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:07.888000 audit[6433]: CRED_ACQ pid=6433 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:07.945896 kernel: audit: type=1103 audit(1747442407.888:1685): pid=6433 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:08.322616 sshd[6431]: pam_unix(sshd:session): session closed for user core May 17 00:40:08.322000 audit[6431]: USER_END pid=6431 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:08.326885 systemd[1]: sshd@21-10.200.4.20:22-10.200.16.10:44476.service: Deactivated successfully. May 17 00:40:08.327709 systemd[1]: session-24.scope: Deactivated successfully. May 17 00:40:08.329063 systemd-logind[1408]: Session 24 logged out. Waiting for processes to exit. May 17 00:40:08.329911 systemd-logind[1408]: Removed session 24. May 17 00:40:08.322000 audit[6431]: CRED_DISP pid=6431 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:08.354616 kernel: audit: type=1106 audit(1747442408.322:1686): pid=6431 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:08.354716 kernel: audit: type=1104 audit(1747442408.322:1687): pid=6431 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:08.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.4.20:22-10.200.16.10:44476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:08.584000 audit[6442]: NETFILTER_CFG table=filter:161 family=2 entries=24 op=nft_register_rule pid=6442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:08.584000 audit[6442]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fffcc3ff190 a2=0 a3=7fffcc3ff17c items=0 ppid=2515 pid=6442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:08.584000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:08.589000 audit[6442]: NETFILTER_CFG table=nat:162 family=2 entries=106 op=nft_register_chain pid=6442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:08.589000 audit[6442]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffcc3ff190 a2=0 a3=7fffcc3ff17c items=0 ppid=2515 pid=6442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:08.589000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:11.086040 kubelet[2411]: E0517 00:40:11.085983 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-55d4b57f4c-xrphf" podUID="a3dfc93e-f9da-4eec-b12c-30e9f327b06d" May 17 00:40:13.447437 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:40:13.447636 kernel: audit: type=1130 audit(1747442413.426:1691): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.4.20:22-10.200.16.10:36822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:13.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.4.20:22-10.200.16.10:36822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:13.427898 systemd[1]: Started sshd@22-10.200.4.20:22-10.200.16.10:36822.service. May 17 00:40:14.007000 audit[6451]: USER_ACCT pid=6451 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:14.016007 sshd[6451]: Accepted publickey for core from 10.200.16.10 port 36822 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:14.030853 kernel: audit: type=1101 audit(1747442414.007:1692): pid=6451 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:14.030829 sshd[6451]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:14.028000 audit[6451]: CRED_ACQ pid=6451 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:14.036811 systemd-logind[1408]: New session 25 of user core. May 17 00:40:14.037421 systemd[1]: Started session-25.scope. May 17 00:40:14.059131 kernel: audit: type=1103 audit(1747442414.028:1693): pid=6451 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:14.059284 kernel: audit: type=1006 audit(1747442414.028:1694): pid=6451 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 17 00:40:14.028000 audit[6451]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3f3c86c0 a2=3 a3=0 items=0 ppid=1 pid=6451 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:14.079894 kernel: audit: type=1300 audit(1747442414.028:1694): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3f3c86c0 a2=3 a3=0 items=0 ppid=1 pid=6451 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:14.080038 kernel: audit: type=1327 audit(1747442414.028:1694): proctitle=737368643A20636F7265205B707269765D May 17 00:40:14.028000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:14.046000 audit[6451]: USER_START pid=6451 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:14.104403 kernel: audit: type=1105 audit(1747442414.046:1695): pid=6451 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:14.059000 audit[6453]: CRED_ACQ pid=6453 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:14.120780 kernel: audit: type=1103 audit(1747442414.059:1696): pid=6453 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:14.542814 sshd[6451]: pam_unix(sshd:session): session closed for user core May 17 00:40:14.542000 audit[6451]: USER_END pid=6451 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:14.545646 systemd[1]: sshd@22-10.200.4.20:22-10.200.16.10:36822.service: Deactivated successfully. May 17 00:40:14.547597 systemd[1]: session-25.scope: Deactivated successfully. May 17 00:40:14.548460 systemd-logind[1408]: Session 25 logged out. Waiting for processes to exit. May 17 00:40:14.549435 systemd-logind[1408]: Removed session 25. May 17 00:40:14.542000 audit[6451]: CRED_DISP pid=6451 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:14.574356 kernel: audit: type=1106 audit(1747442414.542:1697): pid=6451 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:14.574445 kernel: audit: type=1104 audit(1747442414.542:1698): pid=6451 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:14.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.4.20:22-10.200.16.10:36822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:19.085646 kubelet[2411]: E0517 00:40:19.085589 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-shhph" podUID="6c0070f8-dd11-4a02-a60b-d807c5fc3160" May 17 00:40:19.643791 systemd[1]: Started sshd@23-10.200.4.20:22-10.200.16.10:41182.service. May 17 00:40:19.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.4.20:22-10.200.16.10:41182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:19.650807 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:40:19.650886 kernel: audit: type=1130 audit(1747442419.642:1700): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.4.20:22-10.200.16.10:41182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:20.229000 audit[6482]: USER_ACCT pid=6482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:20.248776 kernel: audit: type=1101 audit(1747442420.229:1701): pid=6482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:20.248840 sshd[6482]: Accepted publickey for core from 10.200.16.10 port 41182 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:20.249316 sshd[6482]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:20.246000 audit[6482]: CRED_ACQ pid=6482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:20.255042 systemd[1]: Started session-26.scope. May 17 00:40:20.255809 systemd-logind[1408]: New session 26 of user core. May 17 00:40:20.275294 kernel: audit: type=1103 audit(1747442420.246:1702): pid=6482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:20.275422 kernel: audit: type=1006 audit(1747442420.247:1703): pid=6482 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 17 00:40:20.275462 kernel: audit: type=1300 audit(1747442420.247:1703): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3c9f42b0 a2=3 a3=0 items=0 ppid=1 pid=6482 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:20.247000 audit[6482]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3c9f42b0 a2=3 a3=0 items=0 ppid=1 pid=6482 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:20.247000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:20.259000 audit[6482]: USER_START pid=6482 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:20.312522 kernel: audit: type=1327 audit(1747442420.247:1703): proctitle=737368643A20636F7265205B707269765D May 17 00:40:20.312695 kernel: audit: type=1105 audit(1747442420.259:1704): pid=6482 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:20.312728 kernel: audit: type=1103 audit(1747442420.259:1705): pid=6484 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:20.259000 audit[6484]: CRED_ACQ pid=6484 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:20.716630 sshd[6482]: pam_unix(sshd:session): session closed for user core May 17 00:40:20.716000 audit[6482]: USER_END pid=6482 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:20.720472 systemd[1]: sshd@23-10.200.4.20:22-10.200.16.10:41182.service: Deactivated successfully. May 17 00:40:20.721307 systemd[1]: session-26.scope: Deactivated successfully. May 17 00:40:20.722779 systemd-logind[1408]: Session 26 logged out. Waiting for processes to exit. May 17 00:40:20.723834 systemd-logind[1408]: Removed session 26. May 17 00:40:20.716000 audit[6482]: CRED_DISP pid=6482 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:20.750170 kernel: audit: type=1106 audit(1747442420.716:1706): pid=6482 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:20.750312 kernel: audit: type=1104 audit(1747442420.716:1707): pid=6482 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:20.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.4.20:22-10.200.16.10:41182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:23.085174 kubelet[2411]: E0517 00:40:23.085122 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-55d4b57f4c-xrphf" podUID="a3dfc93e-f9da-4eec-b12c-30e9f327b06d" May 17 00:40:25.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.4.20:22-10.200.16.10:41198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:25.824865 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:40:25.824942 kernel: audit: type=1130 audit(1747442425.816:1709): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.4.20:22-10.200.16.10:41198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:25.818234 systemd[1]: Started sshd@24-10.200.4.20:22-10.200.16.10:41198.service. May 17 00:40:26.401000 audit[6498]: USER_ACCT pid=6498 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:26.420774 sshd[6498]: Accepted publickey for core from 10.200.16.10 port 41198 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:26.421158 kernel: audit: type=1101 audit(1747442426.401:1710): pid=6498 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:26.421383 sshd[6498]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:26.419000 audit[6498]: CRED_ACQ pid=6498 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:26.430128 systemd[1]: Started session-27.scope. May 17 00:40:26.431443 systemd-logind[1408]: New session 27 of user core. May 17 00:40:26.438782 kernel: audit: type=1103 audit(1747442426.419:1711): pid=6498 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:26.419000 audit[6498]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4fe785b0 a2=3 a3=0 items=0 ppid=1 pid=6498 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:26.464120 kernel: audit: type=1006 audit(1747442426.419:1712): pid=6498 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 17 00:40:26.464245 kernel: audit: type=1300 audit(1747442426.419:1712): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4fe785b0 a2=3 a3=0 items=0 ppid=1 pid=6498 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:26.419000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:26.464779 kernel: audit: type=1327 audit(1747442426.419:1712): proctitle=737368643A20636F7265205B707269765D May 17 00:40:26.431000 audit[6498]: USER_START pid=6498 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:26.470898 kernel: audit: type=1105 audit(1747442426.431:1713): pid=6498 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:26.438000 audit[6502]: CRED_ACQ pid=6502 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:26.486774 kernel: audit: type=1103 audit(1747442426.438:1714): pid=6502 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:26.764742 systemd[1]: run-containerd-runc-k8s.io-0c2f6a779a69fabb45cb2e90f43be91e3f28598b97e15cf715be17755c276045-runc.sv8lD8.mount: Deactivated successfully. May 17 00:40:26.970000 audit[6498]: USER_END pid=6498 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:26.971100 sshd[6498]: pam_unix(sshd:session): session closed for user core May 17 00:40:26.974996 systemd[1]: sshd@24-10.200.4.20:22-10.200.16.10:41198.service: Deactivated successfully. May 17 00:40:26.975972 systemd[1]: session-27.scope: Deactivated successfully. May 17 00:40:26.977642 systemd-logind[1408]: Session 27 logged out. Waiting for processes to exit. May 17 00:40:26.978589 systemd-logind[1408]: Removed session 27. May 17 00:40:26.970000 audit[6498]: CRED_DISP pid=6498 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:27.005453 kernel: audit: type=1106 audit(1747442426.970:1715): pid=6498 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:27.005539 kernel: audit: type=1104 audit(1747442426.970:1716): pid=6498 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:26.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.4.20:22-10.200.16.10:41198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:32.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.4.20:22-10.200.16.10:58180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:32.072489 systemd[1]: Started sshd@25-10.200.4.20:22-10.200.16.10:58180.service. May 17 00:40:32.077094 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:40:32.077185 kernel: audit: type=1130 audit(1747442432.072:1718): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.4.20:22-10.200.16.10:58180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:32.657000 audit[6532]: USER_ACCT pid=6532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:32.658493 sshd[6532]: Accepted publickey for core from 10.200.16.10 port 58180 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:32.676791 kernel: audit: type=1101 audit(1747442432.657:1719): pid=6532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:32.675459 sshd[6532]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:32.674000 audit[6532]: CRED_ACQ pid=6532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:32.682087 systemd[1]: Started session-28.scope. May 17 00:40:32.683094 systemd-logind[1408]: New session 28 of user core. May 17 00:40:32.698038 kernel: audit: type=1103 audit(1747442432.674:1720): pid=6532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:32.674000 audit[6532]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc29e4b510 a2=3 a3=0 items=0 ppid=1 pid=6532 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:32.723329 kernel: audit: type=1006 audit(1747442432.674:1721): pid=6532 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 May 17 00:40:32.723511 kernel: audit: type=1300 audit(1747442432.674:1721): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc29e4b510 a2=3 a3=0 items=0 ppid=1 pid=6532 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:32.723545 kernel: audit: type=1327 audit(1747442432.674:1721): proctitle=737368643A20636F7265205B707269765D May 17 00:40:32.674000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:32.693000 audit[6532]: USER_START pid=6532 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:32.745240 kernel: audit: type=1105 audit(1747442432.693:1722): pid=6532 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:32.745397 kernel: audit: type=1103 audit(1747442432.695:1723): pid=6534 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:32.695000 audit[6534]: CRED_ACQ pid=6534 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:33.085583 env[1418]: time="2025-05-17T00:40:33.085533370Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:40:33.148245 sshd[6532]: pam_unix(sshd:session): session closed for user core May 17 00:40:33.149000 audit[6532]: USER_END pid=6532 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:33.151956 systemd[1]: sshd@25-10.200.4.20:22-10.200.16.10:58180.service: Deactivated successfully. May 17 00:40:33.152790 systemd[1]: session-28.scope: Deactivated successfully. May 17 00:40:33.160961 systemd-logind[1408]: Session 28 logged out. Waiting for processes to exit. May 17 00:40:33.162073 systemd-logind[1408]: Removed session 28. May 17 00:40:33.149000 audit[6532]: CRED_DISP pid=6532 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:33.181972 kernel: audit: type=1106 audit(1747442433.149:1724): pid=6532 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:33.182094 kernel: audit: type=1104 audit(1747442433.149:1725): pid=6532 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:33.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.4.20:22-10.200.16.10:58180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:33.306682 env[1418]: time="2025-05-17T00:40:33.306614945Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:40:33.309476 env[1418]: time="2025-05-17T00:40:33.309414260Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:40:33.309937 kubelet[2411]: E0517 00:40:33.309889 2411 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:40:33.310440 kubelet[2411]: E0517 00:40:33.309954 2411 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:40:33.310440 kubelet[2411]: E0517 00:40:33.310150 2411 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-jzznx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-shhph_calico-system(6c0070f8-dd11-4a02-a60b-d807c5fc3160): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:40:33.311918 kubelet[2411]: E0517 00:40:33.311851 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-shhph" podUID="6c0070f8-dd11-4a02-a60b-d807c5fc3160" May 17 00:40:37.085079 env[1418]: time="2025-05-17T00:40:37.085029556Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:40:37.275007 env[1418]: time="2025-05-17T00:40:37.274930880Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:40:37.279369 env[1418]: time="2025-05-17T00:40:37.279304603Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:40:37.279586 kubelet[2411]: E0517 00:40:37.279546 2411 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:40:37.279979 kubelet[2411]: E0517 00:40:37.279601 2411 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:40:37.279979 kubelet[2411]: E0517 00:40:37.279734 2411 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:26dea4d59cac475bbf848f70692bf24a,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-z79vf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-55d4b57f4c-xrphf_calico-system(a3dfc93e-f9da-4eec-b12c-30e9f327b06d): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:40:37.282021 env[1418]: time="2025-05-17T00:40:37.281991018Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:40:37.465618 env[1418]: time="2025-05-17T00:40:37.465457007Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:40:37.473708 env[1418]: time="2025-05-17T00:40:37.473638951Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:40:37.474060 kubelet[2411]: E0517 00:40:37.474018 2411 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:40:37.474175 kubelet[2411]: E0517 00:40:37.474071 2411 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:40:37.474260 kubelet[2411]: E0517 00:40:37.474211 2411 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-z79vf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-55d4b57f4c-xrphf_calico-system(a3dfc93e-f9da-4eec-b12c-30e9f327b06d): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:40:37.475661 kubelet[2411]: E0517 00:40:37.475625 2411 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-55d4b57f4c-xrphf" podUID="a3dfc93e-f9da-4eec-b12c-30e9f327b06d" May 17 00:40:38.252779 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:40:38.252907 kernel: audit: type=1130 audit(1747442438.247:1727): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.4.20:22-10.200.16.10:58184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:38.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.4.20:22-10.200.16.10:58184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:38.247596 systemd[1]: Started sshd@26-10.200.4.20:22-10.200.16.10:58184.service. May 17 00:40:38.833000 audit[6558]: USER_ACCT pid=6558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:38.836305 sshd[6558]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:38.852715 sshd[6558]: Accepted publickey for core from 10.200.16.10 port 58184 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:38.852946 kernel: audit: type=1101 audit(1747442438.833:1728): pid=6558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:38.833000 audit[6558]: CRED_ACQ pid=6558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:38.868627 systemd[1]: Started session-29.scope. May 17 00:40:38.869846 kernel: audit: type=1103 audit(1747442438.833:1729): pid=6558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:38.869921 kernel: audit: type=1006 audit(1747442438.833:1730): pid=6558 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 May 17 00:40:38.869999 systemd-logind[1408]: New session 29 of user core. May 17 00:40:38.833000 audit[6558]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0c6d5d80 a2=3 a3=0 items=0 ppid=1 pid=6558 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:38.895175 kernel: audit: type=1300 audit(1747442438.833:1730): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0c6d5d80 a2=3 a3=0 items=0 ppid=1 pid=6558 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:38.896562 kernel: audit: type=1327 audit(1747442438.833:1730): proctitle=737368643A20636F7265205B707269765D May 17 00:40:38.833000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:38.900825 kernel: audit: type=1105 audit(1747442438.875:1731): pid=6558 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:38.875000 audit[6558]: USER_START pid=6558 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:38.879000 audit[6560]: CRED_ACQ pid=6560 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:38.930535 kernel: audit: type=1103 audit(1747442438.879:1732): pid=6560 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:39.324425 sshd[6558]: pam_unix(sshd:session): session closed for user core May 17 00:40:39.326000 audit[6558]: USER_END pid=6558 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:39.328850 systemd[1]: sshd@26-10.200.4.20:22-10.200.16.10:58184.service: Deactivated successfully. May 17 00:40:39.329820 systemd[1]: session-29.scope: Deactivated successfully. May 17 00:40:39.331497 systemd-logind[1408]: Session 29 logged out. Waiting for processes to exit. May 17 00:40:39.332438 systemd-logind[1408]: Removed session 29. May 17 00:40:39.326000 audit[6558]: CRED_DISP pid=6558 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:39.358677 kernel: audit: type=1106 audit(1747442439.326:1733): pid=6558 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:39.358822 kernel: audit: type=1104 audit(1747442439.326:1734): pid=6558 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:39.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.4.20:22-10.200.16.10:58184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:41.135000 audit[4755]: AVC avc: denied { watch } for pid=4755 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_37_19.3293374513/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c193,c552 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c193,c552 tclass=file permissive=0 May 17 00:40:41.135000 audit[4755]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00242b2c0 a2=fc6 a3=0 items=0 ppid=4274 pid=4755 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c193,c552 key=(null) May 17 00:40:41.135000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:40:41.620000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:41.620000 audit[2236]: AVC avc: denied { watch } for pid=2236 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:41.620000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00293d4a0 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:40:41.620000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:40:41.620000 audit[2236]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000904320 a2=fc6 a3=0 items=0 ppid=2091 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c225,c405 key=(null) May 17 00:40:41.620000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:40:42.489000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:42.489000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00ad424b0 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:40:42.489000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:40:42.516000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:42.516000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:42.516000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7e a1=c0119a7e60 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:40:42.516000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:40:42.516000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00e00fc20 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:40:42.516000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:40:42.516000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:42.516000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00ad42510 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:40:42.516000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:40:42.550000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:42.550000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00e00fe20 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:40:42.550000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:40:42.551000 audit[2272]: AVC avc: denied { watch } for pid=2272 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:42.551000 audit[2272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00ad42690 a2=fc6 a3=0 items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c857 key=(null) May 17 00:40:42.551000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3230002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265