May 17 00:35:36.021699 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:35:36.021734 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:35:36.021747 kernel: BIOS-provided physical RAM map: May 17 00:35:36.021758 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 17 00:35:36.021767 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved May 17 00:35:36.021777 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable May 17 00:35:36.021791 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved May 17 00:35:36.021801 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data May 17 00:35:36.021809 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS May 17 00:35:36.021818 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable May 17 00:35:36.021827 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable May 17 00:35:36.021837 kernel: printk: bootconsole [earlyser0] enabled May 17 00:35:36.021846 kernel: NX (Execute Disable) protection: active May 17 00:35:36.021855 kernel: efi: EFI v2.70 by Microsoft May 17 00:35:36.021886 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c7a98 RNG=0x3ffd1018 May 17 00:35:36.021898 kernel: random: crng init done May 17 00:35:36.021908 kernel: SMBIOS 3.1.0 present. May 17 00:35:36.021919 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 May 17 00:35:36.021930 kernel: Hypervisor detected: Microsoft Hyper-V May 17 00:35:36.021940 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 May 17 00:35:36.021951 kernel: Hyper-V Host Build:20348-10.0-1-0.1827 May 17 00:35:36.021960 kernel: Hyper-V: Nested features: 0x1e0101 May 17 00:35:36.021973 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 May 17 00:35:36.021984 kernel: Hyper-V: Using hypercall for remote TLB flush May 17 00:35:36.021995 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns May 17 00:35:36.022005 kernel: tsc: Marking TSC unstable due to running on Hyper-V May 17 00:35:36.022016 kernel: tsc: Detected 2593.907 MHz processor May 17 00:35:36.022027 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:35:36.022039 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:35:36.022050 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 May 17 00:35:36.022060 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:35:36.022072 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved May 17 00:35:36.022085 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 May 17 00:35:36.022096 kernel: Using GB pages for direct mapping May 17 00:35:36.022107 kernel: Secure boot disabled May 17 00:35:36.022118 kernel: ACPI: Early table checksum verification disabled May 17 00:35:36.022129 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) May 17 00:35:36.022140 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:36.022151 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:36.022163 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) May 17 00:35:36.022181 kernel: ACPI: FACS 0x000000003FFFE000 000040 May 17 00:35:36.022193 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:36.022205 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:36.022216 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:36.022227 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:36.022240 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:36.022255 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:36.022267 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:35:36.022279 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] May 17 00:35:36.022292 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] May 17 00:35:36.022304 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] May 17 00:35:36.022317 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] May 17 00:35:36.022329 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] May 17 00:35:36.022342 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] May 17 00:35:36.022356 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] May 17 00:35:36.022368 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] May 17 00:35:36.022380 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] May 17 00:35:36.022393 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] May 17 00:35:36.022405 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 17 00:35:36.022417 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 17 00:35:36.022429 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug May 17 00:35:36.022441 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug May 17 00:35:36.022453 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug May 17 00:35:36.022468 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug May 17 00:35:36.022480 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug May 17 00:35:36.022492 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug May 17 00:35:36.022504 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug May 17 00:35:36.022516 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug May 17 00:35:36.022529 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug May 17 00:35:36.022541 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug May 17 00:35:36.022554 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug May 17 00:35:36.022566 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug May 17 00:35:36.022581 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug May 17 00:35:36.022594 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug May 17 00:35:36.022606 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug May 17 00:35:36.022618 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug May 17 00:35:36.022631 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] May 17 00:35:36.022643 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] May 17 00:35:36.022655 kernel: Zone ranges: May 17 00:35:36.022668 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:35:36.022680 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 17 00:35:36.022695 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] May 17 00:35:36.022707 kernel: Movable zone start for each node May 17 00:35:36.022720 kernel: Early memory node ranges May 17 00:35:36.022732 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 17 00:35:36.022744 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] May 17 00:35:36.022757 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] May 17 00:35:36.022770 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] May 17 00:35:36.022782 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] May 17 00:35:36.022795 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:35:36.022809 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 17 00:35:36.022821 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges May 17 00:35:36.022834 kernel: ACPI: PM-Timer IO Port: 0x408 May 17 00:35:36.022845 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) May 17 00:35:36.022858 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 May 17 00:35:36.022880 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 17 00:35:36.022903 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:35:36.022914 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 May 17 00:35:36.022926 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 17 00:35:36.022942 kernel: [mem 0x40000000-0xffffffff] available for PCI devices May 17 00:35:36.022955 kernel: Booting paravirtualized kernel on Hyper-V May 17 00:35:36.022968 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:35:36.022981 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 17 00:35:36.022993 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 17 00:35:36.023006 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 17 00:35:36.023017 kernel: pcpu-alloc: [0] 0 1 May 17 00:35:36.023029 kernel: Hyper-V: PV spinlocks enabled May 17 00:35:36.023041 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 17 00:35:36.023056 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 May 17 00:35:36.023069 kernel: Policy zone: Normal May 17 00:35:36.023083 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:35:36.023095 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:35:36.023107 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) May 17 00:35:36.023120 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 17 00:35:36.023133 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:35:36.023145 kernel: Memory: 8079088K/8387460K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 308112K reserved, 0K cma-reserved) May 17 00:35:36.023160 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 00:35:36.023172 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:35:36.023196 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:35:36.023213 kernel: rcu: Hierarchical RCU implementation. May 17 00:35:36.023228 kernel: rcu: RCU event tracing is enabled. May 17 00:35:36.023241 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 00:35:36.023254 kernel: Rude variant of Tasks RCU enabled. May 17 00:35:36.023266 kernel: Tracing variant of Tasks RCU enabled. May 17 00:35:36.023279 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:35:36.023291 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 00:35:36.023304 kernel: Using NULL legacy PIC May 17 00:35:36.023319 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 May 17 00:35:36.023331 kernel: Console: colour dummy device 80x25 May 17 00:35:36.023344 kernel: printk: console [tty1] enabled May 17 00:35:36.023357 kernel: printk: console [ttyS0] enabled May 17 00:35:36.023370 kernel: printk: bootconsole [earlyser0] disabled May 17 00:35:36.023384 kernel: ACPI: Core revision 20210730 May 17 00:35:36.023397 kernel: Failed to register legacy timer interrupt May 17 00:35:36.023409 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:35:36.023421 kernel: Hyper-V: Using IPI hypercalls May 17 00:35:36.023434 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593907) May 17 00:35:36.023447 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 17 00:35:36.023460 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 17 00:35:36.023472 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:35:36.023485 kernel: Spectre V2 : Mitigation: Retpolines May 17 00:35:36.023497 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 17 00:35:36.023513 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! May 17 00:35:36.023526 kernel: RETBleed: Vulnerable May 17 00:35:36.023538 kernel: Speculative Store Bypass: Vulnerable May 17 00:35:36.023551 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:35:36.023563 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:35:36.023576 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:35:36.023588 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:35:36.023601 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:35:36.023614 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' May 17 00:35:36.023627 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' May 17 00:35:36.023642 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' May 17 00:35:36.023655 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:35:36.023667 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 May 17 00:35:36.023680 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 May 17 00:35:36.023693 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 May 17 00:35:36.023706 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. May 17 00:35:36.023719 kernel: Freeing SMP alternatives memory: 32K May 17 00:35:36.023733 kernel: pid_max: default: 32768 minimum: 301 May 17 00:35:36.023745 kernel: LSM: Security Framework initializing May 17 00:35:36.023758 kernel: SELinux: Initializing. May 17 00:35:36.023771 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:35:36.023784 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:35:36.023799 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) May 17 00:35:36.023813 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. May 17 00:35:36.023826 kernel: signal: max sigframe size: 3632 May 17 00:35:36.023839 kernel: rcu: Hierarchical SRCU implementation. May 17 00:35:36.023852 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 17 00:35:36.023877 kernel: smp: Bringing up secondary CPUs ... May 17 00:35:36.023891 kernel: x86: Booting SMP configuration: May 17 00:35:36.023904 kernel: .... node #0, CPUs: #1 May 17 00:35:36.023917 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. May 17 00:35:36.023938 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 17 00:35:36.023953 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:35:36.023965 kernel: smpboot: Max logical packages: 1 May 17 00:35:36.023979 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) May 17 00:35:36.023994 kernel: devtmpfs: initialized May 17 00:35:36.024007 kernel: x86/mm: Memory block size: 128MB May 17 00:35:36.024019 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) May 17 00:35:36.024033 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:35:36.024045 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 00:35:36.024062 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:35:36.024076 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:35:36.024089 kernel: audit: initializing netlink subsys (disabled) May 17 00:35:36.024102 kernel: audit: type=2000 audit(1747442135.023:1): state=initialized audit_enabled=0 res=1 May 17 00:35:36.024114 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:35:36.024127 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:35:36.024139 kernel: cpuidle: using governor menu May 17 00:35:36.024152 kernel: ACPI: bus type PCI registered May 17 00:35:36.024164 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:35:36.024180 kernel: dca service started, version 1.12.1 May 17 00:35:36.024193 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:35:36.024206 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:35:36.024219 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:35:36.024232 kernel: ACPI: Added _OSI(Module Device) May 17 00:35:36.024246 kernel: ACPI: Added _OSI(Processor Device) May 17 00:35:36.024259 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:35:36.024273 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:35:36.024284 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:35:36.024300 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:35:36.024313 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:35:36.024327 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 17 00:35:36.024340 kernel: ACPI: Interpreter enabled May 17 00:35:36.024352 kernel: ACPI: PM: (supports S0 S5) May 17 00:35:36.024366 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:35:36.024378 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:35:36.024392 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F May 17 00:35:36.024406 kernel: iommu: Default domain type: Translated May 17 00:35:36.024423 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:35:36.024435 kernel: vgaarb: loaded May 17 00:35:36.024448 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:35:36.024460 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:35:36.024471 kernel: PTP clock support registered May 17 00:35:36.024483 kernel: Registered efivars operations May 17 00:35:36.024496 kernel: PCI: Using ACPI for IRQ routing May 17 00:35:36.024508 kernel: PCI: System does not support PCI May 17 00:35:36.024522 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page May 17 00:35:36.024538 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:35:36.024552 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:35:36.024563 kernel: pnp: PnP ACPI init May 17 00:35:36.024575 kernel: pnp: PnP ACPI: found 3 devices May 17 00:35:36.024585 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:35:36.024592 kernel: NET: Registered PF_INET protocol family May 17 00:35:36.024599 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 17 00:35:36.024607 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) May 17 00:35:36.024614 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:35:36.024630 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) May 17 00:35:36.024644 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) May 17 00:35:36.024658 kernel: TCP: Hash tables configured (established 65536 bind 65536) May 17 00:35:36.024671 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) May 17 00:35:36.024684 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) May 17 00:35:36.024699 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:35:36.024713 kernel: NET: Registered PF_XDP protocol family May 17 00:35:36.024726 kernel: PCI: CLS 0 bytes, default 64 May 17 00:35:36.024741 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 17 00:35:36.024758 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) May 17 00:35:36.024772 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 17 00:35:36.024786 kernel: Initialise system trusted keyrings May 17 00:35:36.024800 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 May 17 00:35:36.024814 kernel: Key type asymmetric registered May 17 00:35:36.024826 kernel: Asymmetric key parser 'x509' registered May 17 00:35:36.024837 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:35:36.024849 kernel: io scheduler mq-deadline registered May 17 00:35:36.024860 kernel: io scheduler kyber registered May 17 00:35:36.024890 kernel: io scheduler bfq registered May 17 00:35:36.024904 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:35:36.024917 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:35:36.024931 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:35:36.024945 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A May 17 00:35:36.024958 kernel: i8042: PNP: No PS/2 controller found. May 17 00:35:36.025119 kernel: rtc_cmos 00:02: registered as rtc0 May 17 00:35:36.026898 kernel: rtc_cmos 00:02: setting system clock to 2025-05-17T00:35:35 UTC (1747442135) May 17 00:35:36.027034 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram May 17 00:35:36.027055 kernel: intel_pstate: CPU model not supported May 17 00:35:36.027070 kernel: efifb: probing for efifb May 17 00:35:36.027084 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k May 17 00:35:36.027097 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 May 17 00:35:36.027111 kernel: efifb: scrolling: redraw May 17 00:35:36.027124 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 17 00:35:36.027136 kernel: Console: switching to colour frame buffer device 128x48 May 17 00:35:36.027151 kernel: fb0: EFI VGA frame buffer device May 17 00:35:36.027162 kernel: pstore: Registered efi as persistent store backend May 17 00:35:36.027174 kernel: NET: Registered PF_INET6 protocol family May 17 00:35:36.027188 kernel: Segment Routing with IPv6 May 17 00:35:36.027200 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:35:36.027213 kernel: NET: Registered PF_PACKET protocol family May 17 00:35:36.027227 kernel: Key type dns_resolver registered May 17 00:35:36.027240 kernel: IPI shorthand broadcast: enabled May 17 00:35:36.027254 kernel: sched_clock: Marking stable (780749100, 23365600)->(1004834300, -200719600) May 17 00:35:36.027268 kernel: registered taskstats version 1 May 17 00:35:36.027285 kernel: Loading compiled-in X.509 certificates May 17 00:35:36.027299 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:35:36.027314 kernel: Key type .fscrypt registered May 17 00:35:36.027327 kernel: Key type fscrypt-provisioning registered May 17 00:35:36.027341 kernel: pstore: Using crash dump compression: deflate May 17 00:35:36.027355 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:35:36.027370 kernel: ima: Allocated hash algorithm: sha1 May 17 00:35:36.027383 kernel: ima: No architecture policies found May 17 00:35:36.027399 kernel: clk: Disabling unused clocks May 17 00:35:36.027413 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:35:36.027426 kernel: Write protecting the kernel read-only data: 28672k May 17 00:35:36.027439 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:35:36.027450 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:35:36.027463 kernel: Run /init as init process May 17 00:35:36.027476 kernel: with arguments: May 17 00:35:36.027489 kernel: /init May 17 00:35:36.027500 kernel: with environment: May 17 00:35:36.027515 kernel: HOME=/ May 17 00:35:36.027526 kernel: TERM=linux May 17 00:35:36.027536 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:35:36.027550 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:35:36.027564 systemd[1]: Detected virtualization microsoft. May 17 00:35:36.027574 systemd[1]: Detected architecture x86-64. May 17 00:35:36.027583 systemd[1]: Running in initrd. May 17 00:35:36.027593 systemd[1]: No hostname configured, using default hostname. May 17 00:35:36.027604 systemd[1]: Hostname set to . May 17 00:35:36.027614 systemd[1]: Initializing machine ID from random generator. May 17 00:35:36.027625 systemd[1]: Queued start job for default target initrd.target. May 17 00:35:36.027633 systemd[1]: Started systemd-ask-password-console.path. May 17 00:35:36.027643 systemd[1]: Reached target cryptsetup.target. May 17 00:35:36.027652 systemd[1]: Reached target paths.target. May 17 00:35:36.027661 systemd[1]: Reached target slices.target. May 17 00:35:36.027669 systemd[1]: Reached target swap.target. May 17 00:35:36.027682 systemd[1]: Reached target timers.target. May 17 00:35:36.027693 systemd[1]: Listening on iscsid.socket. May 17 00:35:36.027701 systemd[1]: Listening on iscsiuio.socket. May 17 00:35:36.027712 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:35:36.027722 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:35:36.027730 systemd[1]: Listening on systemd-journald.socket. May 17 00:35:36.027740 systemd[1]: Listening on systemd-networkd.socket. May 17 00:35:36.027749 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:35:36.027761 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:35:36.027770 systemd[1]: Reached target sockets.target. May 17 00:35:36.027780 systemd[1]: Starting kmod-static-nodes.service... May 17 00:35:36.027790 systemd[1]: Finished network-cleanup.service. May 17 00:35:36.027798 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:35:36.027809 systemd[1]: Starting systemd-journald.service... May 17 00:35:36.027817 systemd[1]: Starting systemd-modules-load.service... May 17 00:35:36.027827 systemd[1]: Starting systemd-resolved.service... May 17 00:35:36.027835 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:35:36.027848 systemd[1]: Finished kmod-static-nodes.service. May 17 00:35:36.027861 systemd-journald[183]: Journal started May 17 00:35:36.027932 systemd-journald[183]: Runtime Journal (/run/log/journal/7e37256ec73948c780ec8f8b917ee79f) is 8.0M, max 159.0M, 151.0M free. May 17 00:35:36.025989 systemd-modules-load[184]: Inserted module 'overlay' May 17 00:35:36.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.053267 kernel: audit: type=1130 audit(1747442136.038:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.053296 systemd[1]: Started systemd-journald.service. May 17 00:35:36.067428 systemd-resolved[185]: Positive Trust Anchors: May 17 00:35:36.069361 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:35:36.074618 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:35:36.074940 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:35:36.089077 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:35:36.117854 kernel: audit: type=1130 audit(1747442136.073:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.117901 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:35:36.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.093480 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:35:36.138839 kernel: audit: type=1130 audit(1747442136.087:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.113738 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:35:36.127242 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:35:36.178369 kernel: audit: type=1130 audit(1747442136.092:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.178410 kernel: Bridge firewalling registered May 17 00:35:36.178426 kernel: audit: type=1130 audit(1747442136.132:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.178443 kernel: audit: type=1130 audit(1747442136.136:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.133829 systemd-resolved[185]: Defaulting to hostname 'linux'. May 17 00:35:36.134857 systemd[1]: Started systemd-resolved.service. May 17 00:35:36.136954 systemd[1]: Reached target nss-lookup.target. May 17 00:35:36.205437 kernel: audit: type=1130 audit(1747442136.186:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.143797 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:35:36.178316 systemd-modules-load[184]: Inserted module 'br_netfilter' May 17 00:35:36.211162 dracut-cmdline[200]: dracut-dracut-053 May 17 00:35:36.189070 systemd[1]: Starting dracut-cmdline.service... May 17 00:35:36.214982 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:35:36.248889 kernel: SCSI subsystem initialized May 17 00:35:36.273776 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:35:36.273855 kernel: device-mapper: uevent: version 1.0.3 May 17 00:35:36.278889 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:35:36.284609 kernel: Loading iSCSI transport class v2.0-870. May 17 00:35:36.282923 systemd-modules-load[184]: Inserted module 'dm_multipath' May 17 00:35:36.302150 kernel: audit: type=1130 audit(1747442136.284:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.283761 systemd[1]: Finished systemd-modules-load.service. May 17 00:35:36.286435 systemd[1]: Starting systemd-sysctl.service... May 17 00:35:36.308561 systemd[1]: Finished systemd-sysctl.service. May 17 00:35:36.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.323882 kernel: audit: type=1130 audit(1747442136.309:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.332889 kernel: iscsi: registered transport (tcp) May 17 00:35:36.359168 kernel: iscsi: registered transport (qla4xxx) May 17 00:35:36.359226 kernel: QLogic iSCSI HBA Driver May 17 00:35:36.387898 systemd[1]: Finished dracut-cmdline.service. May 17 00:35:36.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.392133 systemd[1]: Starting dracut-pre-udev.service... May 17 00:35:36.441887 kernel: raid6: avx512x4 gen() 18534 MB/s May 17 00:35:36.460878 kernel: raid6: avx512x4 xor() 8298 MB/s May 17 00:35:36.479879 kernel: raid6: avx512x2 gen() 18626 MB/s May 17 00:35:36.499884 kernel: raid6: avx512x2 xor() 29721 MB/s May 17 00:35:36.518874 kernel: raid6: avx512x1 gen() 18591 MB/s May 17 00:35:36.538879 kernel: raid6: avx512x1 xor() 26639 MB/s May 17 00:35:36.558879 kernel: raid6: avx2x4 gen() 18517 MB/s May 17 00:35:36.577873 kernel: raid6: avx2x4 xor() 7727 MB/s May 17 00:35:36.596876 kernel: raid6: avx2x2 gen() 18484 MB/s May 17 00:35:36.616882 kernel: raid6: avx2x2 xor() 22068 MB/s May 17 00:35:36.635874 kernel: raid6: avx2x1 gen() 13746 MB/s May 17 00:35:36.655878 kernel: raid6: avx2x1 xor() 19418 MB/s May 17 00:35:36.675879 kernel: raid6: sse2x4 gen() 11704 MB/s May 17 00:35:36.694884 kernel: raid6: sse2x4 xor() 7330 MB/s May 17 00:35:36.714878 kernel: raid6: sse2x2 gen() 12851 MB/s May 17 00:35:36.734879 kernel: raid6: sse2x2 xor() 7687 MB/s May 17 00:35:36.754875 kernel: raid6: sse2x1 gen() 11598 MB/s May 17 00:35:36.777243 kernel: raid6: sse2x1 xor() 5928 MB/s May 17 00:35:36.777263 kernel: raid6: using algorithm avx512x2 gen() 18626 MB/s May 17 00:35:36.777282 kernel: raid6: .... xor() 29721 MB/s, rmw enabled May 17 00:35:36.784605 kernel: raid6: using avx512x2 recovery algorithm May 17 00:35:36.799891 kernel: xor: automatically using best checksumming function avx May 17 00:35:36.895891 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:35:36.903408 systemd[1]: Finished dracut-pre-udev.service. May 17 00:35:36.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.905000 audit: BPF prog-id=7 op=LOAD May 17 00:35:36.906000 audit: BPF prog-id=8 op=LOAD May 17 00:35:36.907379 systemd[1]: Starting systemd-udevd.service... May 17 00:35:36.922643 systemd-udevd[383]: Using default interface naming scheme 'v252'. May 17 00:35:36.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.927336 systemd[1]: Started systemd-udevd.service. May 17 00:35:36.930335 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:35:36.945012 dracut-pre-trigger[395]: rd.md=0: removing MD RAID activation May 17 00:35:36.976146 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:35:36.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:36.980389 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:35:37.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:37.014576 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:35:37.053884 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:35:37.090880 kernel: hv_vmbus: Vmbus version:5.2 May 17 00:35:37.093911 kernel: hv_vmbus: registering driver hyperv_keyboard May 17 00:35:37.094881 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 May 17 00:35:37.100879 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:35:37.100915 kernel: AES CTR mode by8 optimization enabled May 17 00:35:37.105886 kernel: hv_vmbus: registering driver hv_storvsc May 17 00:35:37.110879 kernel: scsi host1: storvsc_host_t May 17 00:35:37.118882 kernel: scsi host0: storvsc_host_t May 17 00:35:37.119089 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 May 17 00:35:37.119123 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 May 17 00:35:37.131913 kernel: hv_vmbus: registering driver hv_netvsc May 17 00:35:37.150881 kernel: hid: raw HID events driver (C) Jiri Kosina May 17 00:35:37.157626 kernel: hv_vmbus: registering driver hid_hyperv May 17 00:35:37.160748 kernel: sr 0:0:0:2: [sr0] scsi-1 drive May 17 00:35:37.201177 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 17 00:35:37.201193 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 May 17 00:35:37.201212 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) May 17 00:35:37.225457 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on May 17 00:35:37.225563 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks May 17 00:35:37.225670 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 May 17 00:35:37.225770 kernel: sd 0:0:0:0: [sda] Write Protect is off May 17 00:35:37.225883 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 May 17 00:35:37.226054 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA May 17 00:35:37.226204 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:35:37.226227 kernel: sd 0:0:0:0: [sda] Attached SCSI disk May 17 00:35:37.296254 kernel: hv_netvsc 7c1e522c-fc5a-7c1e-522c-fc5a7c1e522c eth0: VF slot 1 added May 17 00:35:37.308994 kernel: hv_vmbus: registering driver hv_pci May 17 00:35:37.309036 kernel: hv_pci c20feba8-366c-4e19-b026-4dce29ffa73e: PCI VMBus probing: Using version 0x10004 May 17 00:35:37.390208 kernel: hv_pci c20feba8-366c-4e19-b026-4dce29ffa73e: PCI host bridge to bus 366c:00 May 17 00:35:37.390340 kernel: pci_bus 366c:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] May 17 00:35:37.390455 kernel: pci_bus 366c:00: No busn resource found for root bus, will use [bus 00-ff] May 17 00:35:37.390546 kernel: pci 366c:00:02.0: [15b3:1016] type 00 class 0x020000 May 17 00:35:37.390659 kernel: pci 366c:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] May 17 00:35:37.390765 kernel: pci 366c:00:02.0: enabling Extended Tags May 17 00:35:37.390901 kernel: pci 366c:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 366c:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) May 17 00:35:37.391005 kernel: pci_bus 366c:00: busn_res: [bus 00-ff] end is updated to 00 May 17 00:35:37.391093 kernel: pci 366c:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] May 17 00:35:37.483887 kernel: mlx5_core 366c:00:02.0: firmware version: 14.30.5000 May 17 00:35:37.738958 kernel: mlx5_core 366c:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) May 17 00:35:37.739140 kernel: mlx5_core 366c:00:02.0: Supported tc offload range - chains: 1, prios: 1 May 17 00:35:37.739307 kernel: mlx5_core 366c:00:02.0: mlx5e_tc_post_act_init:40:(pid 522): firmware level support is missing May 17 00:35:37.739467 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (441) May 17 00:35:37.739486 kernel: hv_netvsc 7c1e522c-fc5a-7c1e-522c-fc5a7c1e522c eth0: VF registering: eth1 May 17 00:35:37.739632 kernel: mlx5_core 366c:00:02.0 eth1: joined to eth0 May 17 00:35:37.733781 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:35:37.746886 kernel: mlx5_core 366c:00:02.0 enP13932s1: renamed from eth1 May 17 00:35:37.758121 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:35:37.906263 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:35:37.961835 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:35:37.967982 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:35:37.973899 systemd[1]: Starting disk-uuid.service... May 17 00:35:38.993889 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:35:38.994068 disk-uuid[559]: The operation has completed successfully. May 17 00:35:39.090374 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:35:39.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:39.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:39.090473 systemd[1]: Finished disk-uuid.service. May 17 00:35:39.100581 systemd[1]: Starting verity-setup.service... May 17 00:35:39.144260 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 17 00:35:39.384014 systemd[1]: Found device dev-mapper-usr.device. May 17 00:35:39.389210 systemd[1]: Mounting sysusr-usr.mount... May 17 00:35:39.392019 systemd[1]: Finished verity-setup.service. May 17 00:35:39.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:39.472431 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:35:39.471250 systemd[1]: Mounted sysusr-usr.mount. May 17 00:35:39.473334 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:35:39.474097 systemd[1]: Starting ignition-setup.service... May 17 00:35:39.483572 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:35:39.501905 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:35:39.501943 kernel: BTRFS info (device sda6): using free space tree May 17 00:35:39.501961 kernel: BTRFS info (device sda6): has skinny extents May 17 00:35:39.551758 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:35:39.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:39.555000 audit: BPF prog-id=9 op=LOAD May 17 00:35:39.556132 systemd[1]: Starting systemd-networkd.service... May 17 00:35:39.579537 systemd-networkd[828]: lo: Link UP May 17 00:35:39.579547 systemd-networkd[828]: lo: Gained carrier May 17 00:35:39.583432 systemd-networkd[828]: Enumeration completed May 17 00:35:39.585172 systemd-networkd[828]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:35:39.585773 systemd[1]: Started systemd-networkd.service. May 17 00:35:39.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:39.592473 systemd[1]: Reached target network.target. May 17 00:35:39.596621 systemd[1]: Starting iscsiuio.service... May 17 00:35:39.602235 systemd[1]: Started iscsiuio.service. May 17 00:35:39.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:39.606286 systemd[1]: Starting iscsid.service... May 17 00:35:39.609676 iscsid[833]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:35:39.609676 iscsid[833]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:35:39.609676 iscsid[833]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:35:39.609676 iscsid[833]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:35:39.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:39.629781 iscsid[833]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:35:39.629781 iscsid[833]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:35:39.611180 systemd[1]: Started iscsid.service. May 17 00:35:39.615665 systemd[1]: Starting dracut-initqueue.service... May 17 00:35:39.646537 systemd[1]: Finished dracut-initqueue.service. May 17 00:35:39.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:39.650487 systemd[1]: Reached target remote-fs-pre.target. May 17 00:35:39.654081 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:35:39.657795 systemd[1]: Reached target remote-fs.target. May 17 00:35:39.661837 systemd[1]: Starting dracut-pre-mount.service... May 17 00:35:39.671882 kernel: mlx5_core 366c:00:02.0 enP13932s1: Link up May 17 00:35:39.673105 systemd[1]: Finished dracut-pre-mount.service. May 17 00:35:39.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:39.694340 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:35:39.705880 kernel: hv_netvsc 7c1e522c-fc5a-7c1e-522c-fc5a7c1e522c eth0: Data path switched to VF: enP13932s1 May 17 00:35:39.706070 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:35:39.710389 systemd-networkd[828]: enP13932s1: Link UP May 17 00:35:39.710520 systemd-networkd[828]: eth0: Link UP May 17 00:35:39.712164 systemd-networkd[828]: eth0: Gained carrier May 17 00:35:39.716045 systemd-networkd[828]: enP13932s1: Gained carrier May 17 00:35:39.777952 systemd-networkd[828]: eth0: DHCPv4 address 10.200.4.17/24, gateway 10.200.4.1 acquired from 168.63.129.16 May 17 00:35:39.811924 systemd[1]: Finished ignition-setup.service. May 17 00:35:39.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:39.816452 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:35:41.007136 systemd-networkd[828]: eth0: Gained IPv6LL May 17 00:35:43.414203 ignition[855]: Ignition 2.14.0 May 17 00:35:43.414220 ignition[855]: Stage: fetch-offline May 17 00:35:43.414307 ignition[855]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:43.414359 ignition[855]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:35:43.469891 ignition[855]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:35:43.471814 ignition[855]: parsed url from cmdline: "" May 17 00:35:43.471823 ignition[855]: no config URL provided May 17 00:35:43.471831 ignition[855]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:35:43.471844 ignition[855]: no config at "/usr/lib/ignition/user.ign" May 17 00:35:43.471852 ignition[855]: failed to fetch config: resource requires networking May 17 00:35:43.472052 ignition[855]: Ignition finished successfully May 17 00:35:43.483257 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:35:43.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:43.486437 systemd[1]: Starting ignition-fetch.service... May 17 00:35:43.504743 kernel: kauditd_printk_skb: 18 callbacks suppressed May 17 00:35:43.504772 kernel: audit: type=1130 audit(1747442143.485:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:43.507622 ignition[861]: Ignition 2.14.0 May 17 00:35:43.507632 ignition[861]: Stage: fetch May 17 00:35:43.507767 ignition[861]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:43.507799 ignition[861]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:35:43.592123 ignition[861]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:35:43.592296 ignition[861]: parsed url from cmdline: "" May 17 00:35:43.592300 ignition[861]: no config URL provided May 17 00:35:43.592305 ignition[861]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:35:43.592313 ignition[861]: no config at "/usr/lib/ignition/user.ign" May 17 00:35:43.592345 ignition[861]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 May 17 00:35:43.666349 ignition[861]: GET result: OK May 17 00:35:43.666522 ignition[861]: config has been read from IMDS userdata May 17 00:35:43.666571 ignition[861]: parsing config with SHA512: b2216fca94f78e24f7d5f463ea14d7357339ed3d722f532f85e7e99bdcd0c3a7a5eccb56060a36f39bbc0eec56227f4f3cf0ca385e2836799f8ec826b322d229 May 17 00:35:43.673746 unknown[861]: fetched base config from "system" May 17 00:35:43.673762 unknown[861]: fetched base config from "system" May 17 00:35:43.673771 unknown[861]: fetched user config from "azure" May 17 00:35:43.679446 ignition[861]: fetch: fetch complete May 17 00:35:43.679456 ignition[861]: fetch: fetch passed May 17 00:35:43.679512 ignition[861]: Ignition finished successfully May 17 00:35:43.685302 systemd[1]: Finished ignition-fetch.service. May 17 00:35:43.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:43.699891 kernel: audit: type=1130 audit(1747442143.686:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:43.698376 systemd[1]: Starting ignition-kargs.service... May 17 00:35:43.710637 ignition[867]: Ignition 2.14.0 May 17 00:35:43.710647 ignition[867]: Stage: kargs May 17 00:35:43.710784 ignition[867]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:43.710816 ignition[867]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:35:43.719253 ignition[867]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:35:43.722857 ignition[867]: kargs: kargs passed May 17 00:35:43.722924 ignition[867]: Ignition finished successfully May 17 00:35:43.726580 systemd[1]: Finished ignition-kargs.service. May 17 00:35:43.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:43.729184 systemd[1]: Starting ignition-disks.service... May 17 00:35:43.744617 kernel: audit: type=1130 audit(1747442143.728:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:43.752061 ignition[873]: Ignition 2.14.0 May 17 00:35:43.753896 ignition[873]: Stage: disks May 17 00:35:43.754028 ignition[873]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:43.754053 ignition[873]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:35:43.757246 ignition[873]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:35:43.760076 ignition[873]: disks: disks passed May 17 00:35:43.760132 ignition[873]: Ignition finished successfully May 17 00:35:43.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:43.761505 systemd[1]: Finished ignition-disks.service. May 17 00:35:43.786193 kernel: audit: type=1130 audit(1747442143.763:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:43.763423 systemd[1]: Reached target initrd-root-device.target. May 17 00:35:43.775757 systemd[1]: Reached target local-fs-pre.target. May 17 00:35:43.776110 systemd[1]: Reached target local-fs.target. May 17 00:35:43.776456 systemd[1]: Reached target sysinit.target. May 17 00:35:43.776816 systemd[1]: Reached target basic.target. May 17 00:35:43.778037 systemd[1]: Starting systemd-fsck-root.service... May 17 00:35:43.912032 systemd-fsck[881]: ROOT: clean, 619/7326000 files, 481079/7359488 blocks May 17 00:35:43.915784 systemd[1]: Finished systemd-fsck-root.service. May 17 00:35:43.933747 kernel: audit: type=1130 audit(1747442143.917:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:43.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:43.921674 systemd[1]: Mounting sysroot.mount... May 17 00:35:43.944891 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:35:43.945112 systemd[1]: Mounted sysroot.mount. May 17 00:35:43.948125 systemd[1]: Reached target initrd-root-fs.target. May 17 00:35:43.987382 systemd[1]: Mounting sysroot-usr.mount... May 17 00:35:43.992893 systemd[1]: Starting flatcar-metadata-hostname.service... May 17 00:35:43.996975 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:35:43.997011 systemd[1]: Reached target ignition-diskful.target. May 17 00:35:44.003469 systemd[1]: Mounted sysroot-usr.mount. May 17 00:35:44.066218 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:35:44.072327 systemd[1]: Starting initrd-setup-root.service... May 17 00:35:44.083901 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (892) May 17 00:35:44.091882 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:35:44.091916 kernel: BTRFS info (device sda6): using free space tree May 17 00:35:44.091928 kernel: BTRFS info (device sda6): has skinny extents May 17 00:35:44.094651 initrd-setup-root[897]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:35:44.101532 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:35:44.117549 initrd-setup-root[923]: cut: /sysroot/etc/group: No such file or directory May 17 00:35:44.138449 initrd-setup-root[931]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:35:44.143368 initrd-setup-root[939]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:35:44.704433 systemd[1]: Finished initrd-setup-root.service. May 17 00:35:44.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:44.707565 systemd[1]: Starting ignition-mount.service... May 17 00:35:44.729006 kernel: audit: type=1130 audit(1747442144.706:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:44.722887 systemd[1]: Starting sysroot-boot.service... May 17 00:35:44.730157 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 17 00:35:44.730251 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 17 00:35:44.749546 ignition[958]: INFO : Ignition 2.14.0 May 17 00:35:44.749546 ignition[958]: INFO : Stage: mount May 17 00:35:44.752958 ignition[958]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:44.752958 ignition[958]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:35:44.760937 ignition[958]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:35:44.765386 ignition[958]: INFO : mount: mount passed May 17 00:35:44.765386 ignition[958]: INFO : Ignition finished successfully May 17 00:35:44.779387 kernel: audit: type=1130 audit(1747442144.765:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:44.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:44.763397 systemd[1]: Finished ignition-mount.service. May 17 00:35:44.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:44.781598 systemd[1]: Finished sysroot-boot.service. May 17 00:35:44.795162 kernel: audit: type=1130 audit(1747442144.783:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:45.763981 coreos-metadata[891]: May 17 00:35:45.763 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 May 17 00:35:45.781604 coreos-metadata[891]: May 17 00:35:45.781 INFO Fetch successful May 17 00:35:45.814485 coreos-metadata[891]: May 17 00:35:45.814 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 May 17 00:35:45.829420 coreos-metadata[891]: May 17 00:35:45.829 INFO Fetch successful May 17 00:35:45.848484 coreos-metadata[891]: May 17 00:35:45.848 INFO wrote hostname ci-3510.3.7-n-191fd4fe6d to /sysroot/etc/hostname May 17 00:35:45.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:45.850513 systemd[1]: Finished flatcar-metadata-hostname.service. May 17 00:35:45.868942 kernel: audit: type=1130 audit(1747442145.853:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:45.855129 systemd[1]: Starting ignition-files.service... May 17 00:35:45.872018 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:35:45.886881 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (970) May 17 00:35:45.886915 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:35:45.890884 kernel: BTRFS info (device sda6): using free space tree May 17 00:35:45.897376 kernel: BTRFS info (device sda6): has skinny extents May 17 00:35:45.923607 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:35:45.936307 ignition[989]: INFO : Ignition 2.14.0 May 17 00:35:45.936307 ignition[989]: INFO : Stage: files May 17 00:35:45.939739 ignition[989]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:45.939739 ignition[989]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:35:45.950000 ignition[989]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:35:45.969273 ignition[989]: DEBUG : files: compiled without relabeling support, skipping May 17 00:35:45.971852 ignition[989]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:35:45.971852 ignition[989]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:35:46.043466 ignition[989]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:35:46.047533 ignition[989]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:35:46.047533 ignition[989]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:35:46.047533 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 17 00:35:46.047533 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 May 17 00:35:46.044081 unknown[989]: wrote ssh authorized keys file for user: core May 17 00:35:46.346389 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 17 00:35:46.435245 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 17 00:35:46.440673 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 17 00:35:46.440673 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:35:46.440673 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 17 00:35:46.440673 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 17 00:35:46.440673 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:35:46.440673 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:35:46.440673 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:35:46.440673 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:35:46.440673 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:35:46.481450 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:35:46.481450 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:35:46.481450 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:35:46.481450 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" May 17 00:35:46.481450 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:35:46.481450 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem845605177" May 17 00:35:46.481450 ignition[989]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem845605177": device or resource busy May 17 00:35:46.481450 ignition[989]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem845605177", trying btrfs: device or resource busy May 17 00:35:46.481450 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem845605177" May 17 00:35:46.481450 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem845605177" May 17 00:35:46.481450 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem845605177" May 17 00:35:46.481450 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem845605177" May 17 00:35:46.481450 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" May 17 00:35:46.481450 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:35:46.464612 systemd[1]: mnt-oem845605177.mount: Deactivated successfully. May 17 00:35:46.550836 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:35:46.550836 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem485342541" May 17 00:35:46.550836 ignition[989]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem485342541": device or resource busy May 17 00:35:46.550836 ignition[989]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem485342541", trying btrfs: device or resource busy May 17 00:35:46.550836 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem485342541" May 17 00:35:46.550836 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem485342541" May 17 00:35:46.550836 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem485342541" May 17 00:35:46.550836 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem485342541" May 17 00:35:46.550836 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:35:46.550836 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:35:46.550836 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 May 17 00:35:46.484084 systemd[1]: mnt-oem485342541.mount: Deactivated successfully. May 17 00:35:47.144171 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK May 17 00:35:47.319568 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" May 17 00:35:47.319568 ignition[989]: INFO : files: op(13): [started] processing unit "waagent.service" May 17 00:35:47.319568 ignition[989]: INFO : files: op(13): [finished] processing unit "waagent.service" May 17 00:35:47.319568 ignition[989]: INFO : files: op(14): [started] processing unit "nvidia.service" May 17 00:35:47.319568 ignition[989]: INFO : files: op(14): [finished] processing unit "nvidia.service" May 17 00:35:47.338288 ignition[989]: INFO : files: op(15): [started] processing unit "prepare-helm.service" May 17 00:35:47.338288 ignition[989]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:35:47.338288 ignition[989]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:35:47.338288 ignition[989]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" May 17 00:35:47.338288 ignition[989]: INFO : files: op(17): [started] setting preset to enabled for "waagent.service" May 17 00:35:47.338288 ignition[989]: INFO : files: op(17): [finished] setting preset to enabled for "waagent.service" May 17 00:35:47.338288 ignition[989]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" May 17 00:35:47.338288 ignition[989]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" May 17 00:35:47.338288 ignition[989]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" May 17 00:35:47.338288 ignition[989]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" May 17 00:35:47.394031 kernel: audit: type=1130 audit(1747442147.361:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.359003 systemd[1]: Finished ignition-files.service. May 17 00:35:47.397492 ignition[989]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:35:47.397492 ignition[989]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:35:47.397492 ignition[989]: INFO : files: files passed May 17 00:35:47.397492 ignition[989]: INFO : Ignition finished successfully May 17 00:35:47.381582 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:35:47.388250 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:35:47.390349 systemd[1]: Starting ignition-quench.service... May 17 00:35:47.414681 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:35:47.414810 systemd[1]: Finished ignition-quench.service. May 17 00:35:47.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.423481 initrd-setup-root-after-ignition[1014]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:35:47.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.424019 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:35:47.427718 systemd[1]: Reached target ignition-complete.target. May 17 00:35:47.429027 systemd[1]: Starting initrd-parse-etc.service... May 17 00:35:47.443496 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:35:47.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.443600 systemd[1]: Finished initrd-parse-etc.service. May 17 00:35:47.447442 systemd[1]: Reached target initrd-fs.target. May 17 00:35:47.449167 systemd[1]: Reached target initrd.target. May 17 00:35:47.452616 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:35:47.453367 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:35:47.468314 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:35:47.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.473229 systemd[1]: Starting initrd-cleanup.service... May 17 00:35:47.482809 systemd[1]: Stopped target nss-lookup.target. May 17 00:35:47.486841 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:35:47.488943 systemd[1]: Stopped target timers.target. May 17 00:35:47.492591 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:35:47.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.492719 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:35:47.496185 systemd[1]: Stopped target initrd.target. May 17 00:35:47.500003 systemd[1]: Stopped target basic.target. May 17 00:35:47.503369 systemd[1]: Stopped target ignition-complete.target. May 17 00:35:47.506691 systemd[1]: Stopped target ignition-diskful.target. May 17 00:35:47.510185 systemd[1]: Stopped target initrd-root-device.target. May 17 00:35:47.514021 systemd[1]: Stopped target remote-fs.target. May 17 00:35:47.517585 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:35:47.521234 systemd[1]: Stopped target sysinit.target. May 17 00:35:47.524454 systemd[1]: Stopped target local-fs.target. May 17 00:35:47.527754 systemd[1]: Stopped target local-fs-pre.target. May 17 00:35:47.531050 systemd[1]: Stopped target swap.target. May 17 00:35:47.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.534365 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:35:47.534495 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:35:47.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.537826 systemd[1]: Stopped target cryptsetup.target. May 17 00:35:47.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.541222 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:35:47.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.541361 systemd[1]: Stopped dracut-initqueue.service. May 17 00:35:47.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.545064 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:35:47.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.578120 ignition[1027]: INFO : Ignition 2.14.0 May 17 00:35:47.578120 ignition[1027]: INFO : Stage: umount May 17 00:35:47.578120 ignition[1027]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:35:47.578120 ignition[1027]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:35:47.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.545192 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:35:47.596802 iscsid[833]: iscsid shutting down. May 17 00:35:47.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.599669 ignition[1027]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:35:47.599669 ignition[1027]: INFO : umount: umount passed May 17 00:35:47.599669 ignition[1027]: INFO : Ignition finished successfully May 17 00:35:47.548967 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:35:47.549094 systemd[1]: Stopped ignition-files.service. May 17 00:35:47.552364 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. May 17 00:35:47.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.552493 systemd[1]: Stopped flatcar-metadata-hostname.service. May 17 00:35:47.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.557170 systemd[1]: Stopping ignition-mount.service... May 17 00:35:47.560158 systemd[1]: Stopping iscsid.service... May 17 00:35:47.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.561762 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:35:47.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.561940 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:35:47.565348 systemd[1]: Stopping sysroot-boot.service... May 17 00:35:47.567118 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:35:47.567312 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:35:47.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.569442 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:35:47.569594 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:35:47.576186 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:35:47.576293 systemd[1]: Stopped iscsid.service. May 17 00:35:47.594957 systemd[1]: Stopping iscsiuio.service... May 17 00:35:47.596992 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:35:47.597076 systemd[1]: Stopped iscsiuio.service. May 17 00:35:47.599812 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:35:47.599929 systemd[1]: Finished initrd-cleanup.service. May 17 00:35:47.615680 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:35:47.616171 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:35:47.616260 systemd[1]: Stopped ignition-mount.service. May 17 00:35:47.618897 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:35:47.618946 systemd[1]: Stopped ignition-disks.service. May 17 00:35:47.621987 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:35:47.622036 systemd[1]: Stopped ignition-kargs.service. May 17 00:35:47.625007 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 00:35:47.625056 systemd[1]: Stopped ignition-fetch.service. May 17 00:35:47.628847 systemd[1]: Stopped target network.target. May 17 00:35:47.632102 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:35:47.633566 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:35:47.639077 systemd[1]: Stopped target paths.target. May 17 00:35:47.642850 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:35:47.648762 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:35:47.681643 systemd[1]: Stopped target slices.target. May 17 00:35:47.684635 systemd[1]: Stopped target sockets.target. May 17 00:35:47.687625 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:35:47.687677 systemd[1]: Closed iscsid.socket. May 17 00:35:47.692208 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:35:47.692251 systemd[1]: Closed iscsiuio.socket. May 17 00:35:47.696543 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:35:47.698371 systemd[1]: Stopped ignition-setup.service. May 17 00:35:47.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.701552 systemd[1]: Stopping systemd-networkd.service... May 17 00:35:47.705015 systemd[1]: Stopping systemd-resolved.service... May 17 00:35:47.706910 systemd-networkd[828]: eth0: DHCPv6 lease lost May 17 00:35:47.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.708712 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:35:47.711000 audit: BPF prog-id=9 op=UNLOAD May 17 00:35:47.708818 systemd[1]: Stopped systemd-networkd.service. May 17 00:35:47.710633 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:35:47.710665 systemd[1]: Closed systemd-networkd.socket. May 17 00:35:47.720804 systemd[1]: Stopping network-cleanup.service... May 17 00:35:47.723282 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:35:47.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.723349 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:35:47.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.728806 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:35:47.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.728859 systemd[1]: Stopped systemd-sysctl.service. May 17 00:35:47.732246 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:35:47.732294 systemd[1]: Stopped systemd-modules-load.service. May 17 00:35:47.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.736513 systemd[1]: Stopping systemd-udevd.service... May 17 00:35:47.740824 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:35:47.741275 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:35:47.741357 systemd[1]: Stopped systemd-resolved.service. May 17 00:35:47.754634 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:35:47.754756 systemd[1]: Stopped systemd-udevd.service. May 17 00:35:47.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.759000 audit: BPF prog-id=6 op=UNLOAD May 17 00:35:47.760983 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:35:47.761043 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:35:47.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.762970 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:35:47.763011 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:35:47.766924 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:35:47.766966 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:35:47.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.771201 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:35:47.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.771249 systemd[1]: Stopped dracut-cmdline.service. May 17 00:35:47.779769 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:35:47.779824 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:35:47.789322 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:35:47.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.791185 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:35:47.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.791257 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:35:47.796030 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:35:47.796112 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:35:47.817882 kernel: hv_netvsc 7c1e522c-fc5a-7c1e-522c-fc5a7c1e522c eth0: Data path switched from VF: enP13932s1 May 17 00:35:47.832437 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:35:47.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:47.832547 systemd[1]: Stopped network-cleanup.service. May 17 00:35:48.121006 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:35:48.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:48.121147 systemd[1]: Stopped sysroot-boot.service. May 17 00:35:48.125275 systemd[1]: Reached target initrd-switch-root.target. May 17 00:35:48.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:48.129312 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:35:48.129373 systemd[1]: Stopped initrd-setup-root.service. May 17 00:35:48.133562 systemd[1]: Starting initrd-switch-root.service... May 17 00:35:48.150670 systemd[1]: Switching root. May 17 00:35:48.171712 systemd-journald[183]: Journal stopped May 17 00:36:05.753198 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). May 17 00:36:05.753237 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:36:05.753251 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:36:05.753263 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:36:05.753273 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:36:05.753282 kernel: SELinux: policy capability open_perms=1 May 17 00:36:05.753295 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:36:05.753305 kernel: SELinux: policy capability always_check_network=0 May 17 00:36:05.753315 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:36:05.753324 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:36:05.753334 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:36:05.753346 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:36:05.753354 kernel: kauditd_printk_skb: 42 callbacks suppressed May 17 00:36:05.753366 kernel: audit: type=1403 audit(1747442151.232:81): auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:36:05.753382 systemd[1]: Successfully loaded SELinux policy in 399.374ms. May 17 00:36:05.753392 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 35.065ms. May 17 00:36:05.753405 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:36:05.753417 systemd[1]: Detected virtualization microsoft. May 17 00:36:05.753429 systemd[1]: Detected architecture x86-64. May 17 00:36:05.753440 systemd[1]: Detected first boot. May 17 00:36:05.753452 systemd[1]: Hostname set to . May 17 00:36:05.753462 systemd[1]: Initializing machine ID from random generator. May 17 00:36:05.753474 kernel: audit: type=1400 audit(1747442152.228:82): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:36:05.753487 kernel: audit: type=1400 audit(1747442152.245:83): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:36:05.753496 kernel: audit: type=1400 audit(1747442152.245:84): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:36:05.753510 kernel: audit: type=1334 audit(1747442152.256:85): prog-id=10 op=LOAD May 17 00:36:05.753521 kernel: audit: type=1334 audit(1747442152.256:86): prog-id=10 op=UNLOAD May 17 00:36:05.753530 kernel: audit: type=1334 audit(1747442152.266:87): prog-id=11 op=LOAD May 17 00:36:05.753541 kernel: audit: type=1334 audit(1747442152.266:88): prog-id=11 op=UNLOAD May 17 00:36:05.753552 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:36:05.753561 kernel: audit: type=1400 audit(1747442153.965:89): avc: denied { associate } for pid=1060 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:36:05.753574 kernel: audit: type=1300 audit(1747442153.965:89): arch=c000003e syscall=188 success=yes exit=0 a0=c00014d892 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=1043 pid=1060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.753588 systemd[1]: Populated /etc with preset unit settings. May 17 00:36:05.753598 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:36:05.753609 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:36:05.753623 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:36:05.753633 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:36:05.753643 kernel: audit: type=1334 audit(1747442165.235:91): prog-id=12 op=LOAD May 17 00:36:05.753655 kernel: audit: type=1334 audit(1747442165.235:92): prog-id=3 op=UNLOAD May 17 00:36:05.753667 kernel: audit: type=1334 audit(1747442165.239:93): prog-id=13 op=LOAD May 17 00:36:05.753681 kernel: audit: type=1334 audit(1747442165.244:94): prog-id=14 op=LOAD May 17 00:36:05.753693 kernel: audit: type=1334 audit(1747442165.244:95): prog-id=4 op=UNLOAD May 17 00:36:05.753703 kernel: audit: type=1334 audit(1747442165.244:96): prog-id=5 op=UNLOAD May 17 00:36:05.753713 kernel: audit: type=1334 audit(1747442165.248:97): prog-id=15 op=LOAD May 17 00:36:05.753725 kernel: audit: type=1334 audit(1747442165.248:98): prog-id=12 op=UNLOAD May 17 00:36:05.753734 kernel: audit: type=1334 audit(1747442165.264:99): prog-id=16 op=LOAD May 17 00:36:05.753745 kernel: audit: type=1334 audit(1747442165.269:100): prog-id=17 op=LOAD May 17 00:36:05.753757 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:36:05.753769 systemd[1]: Stopped initrd-switch-root.service. May 17 00:36:05.753782 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:36:05.753794 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:36:05.753805 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:36:05.753817 systemd[1]: Created slice system-getty.slice. May 17 00:36:05.753829 systemd[1]: Created slice system-modprobe.slice. May 17 00:36:05.753840 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:36:05.753852 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:36:05.753879 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:36:05.753893 systemd[1]: Created slice user.slice. May 17 00:36:05.753903 systemd[1]: Started systemd-ask-password-console.path. May 17 00:36:05.753915 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:36:05.753928 systemd[1]: Set up automount boot.automount. May 17 00:36:05.753937 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:36:05.753950 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:36:05.753963 systemd[1]: Stopped target initrd-fs.target. May 17 00:36:05.753972 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:36:05.753987 systemd[1]: Reached target integritysetup.target. May 17 00:36:05.754000 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:36:05.754011 systemd[1]: Reached target remote-fs.target. May 17 00:36:05.754023 systemd[1]: Reached target slices.target. May 17 00:36:05.754035 systemd[1]: Reached target swap.target. May 17 00:36:05.754045 systemd[1]: Reached target torcx.target. May 17 00:36:05.754057 systemd[1]: Reached target veritysetup.target. May 17 00:36:05.754071 systemd[1]: Listening on systemd-coredump.socket. May 17 00:36:05.754083 systemd[1]: Listening on systemd-initctl.socket. May 17 00:36:05.754095 systemd[1]: Listening on systemd-networkd.socket. May 17 00:36:05.754107 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:36:05.754119 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:36:05.754135 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:36:05.754145 systemd[1]: Mounting dev-hugepages.mount... May 17 00:36:05.754157 systemd[1]: Mounting dev-mqueue.mount... May 17 00:36:05.754170 systemd[1]: Mounting media.mount... May 17 00:36:05.754180 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:36:05.754192 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:36:05.754205 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:36:05.754216 systemd[1]: Mounting tmp.mount... May 17 00:36:05.754228 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:36:05.754243 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:36:05.754254 systemd[1]: Starting kmod-static-nodes.service... May 17 00:36:05.754266 systemd[1]: Starting modprobe@configfs.service... May 17 00:36:05.754278 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:36:05.754291 systemd[1]: Starting modprobe@drm.service... May 17 00:36:05.754303 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:36:05.754314 systemd[1]: Starting modprobe@fuse.service... May 17 00:36:05.754328 systemd[1]: Starting modprobe@loop.service... May 17 00:36:05.754341 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:36:05.754353 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:36:05.754365 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:36:05.754378 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:36:05.754388 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:36:05.754400 systemd[1]: Stopped systemd-journald.service. May 17 00:36:05.754413 systemd[1]: Starting systemd-journald.service... May 17 00:36:05.754423 systemd[1]: Starting systemd-modules-load.service... May 17 00:36:05.754436 systemd[1]: Starting systemd-network-generator.service... May 17 00:36:05.754451 systemd[1]: Starting systemd-remount-fs.service... May 17 00:36:05.754462 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:36:05.754475 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:36:05.754487 systemd[1]: Stopped verity-setup.service. May 17 00:36:05.754501 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:36:05.754512 kernel: loop: module loaded May 17 00:36:05.754524 systemd[1]: Mounted dev-hugepages.mount. May 17 00:36:05.754535 systemd[1]: Mounted dev-mqueue.mount. May 17 00:36:05.754548 systemd[1]: Mounted media.mount. May 17 00:36:05.754561 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:36:05.754574 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:36:05.754587 kernel: fuse: init (API version 7.34) May 17 00:36:05.754596 systemd[1]: Mounted tmp.mount. May 17 00:36:05.754609 systemd[1]: Finished kmod-static-nodes.service. May 17 00:36:05.754622 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:36:05.754640 systemd[1]: Finished modprobe@configfs.service. May 17 00:36:05.754661 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:36:05.754672 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:36:05.754685 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:36:05.754697 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:36:05.754710 systemd[1]: Finished modprobe@drm.service. May 17 00:36:05.754723 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:36:05.754737 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:36:05.754748 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:36:05.754765 systemd-journald[1141]: Journal started May 17 00:36:05.754817 systemd-journald[1141]: Runtime Journal (/run/log/journal/2e7d22ed482d47afb404e9e7ccc5debf) is 8.0M, max 159.0M, 151.0M free. May 17 00:35:51.232000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:35:52.228000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:35:52.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:35:52.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:35:52.256000 audit: BPF prog-id=10 op=LOAD May 17 00:35:52.256000 audit: BPF prog-id=10 op=UNLOAD May 17 00:35:52.266000 audit: BPF prog-id=11 op=LOAD May 17 00:35:52.266000 audit: BPF prog-id=11 op=UNLOAD May 17 00:35:53.965000 audit[1060]: AVC avc: denied { associate } for pid=1060 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:35:53.965000 audit[1060]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d892 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=1043 pid=1060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:53.965000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:35:53.972000 audit[1060]: AVC avc: denied { associate } for pid=1060 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:35:53.972000 audit[1060]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d969 a2=1ed a3=0 items=2 ppid=1043 pid=1060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:53.972000 audit: CWD cwd="/" May 17 00:35:53.972000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:53.972000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:53.972000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:36:05.235000 audit: BPF prog-id=12 op=LOAD May 17 00:36:05.235000 audit: BPF prog-id=3 op=UNLOAD May 17 00:36:05.239000 audit: BPF prog-id=13 op=LOAD May 17 00:36:05.244000 audit: BPF prog-id=14 op=LOAD May 17 00:36:05.244000 audit: BPF prog-id=4 op=UNLOAD May 17 00:36:05.244000 audit: BPF prog-id=5 op=UNLOAD May 17 00:36:05.248000 audit: BPF prog-id=15 op=LOAD May 17 00:36:05.248000 audit: BPF prog-id=12 op=UNLOAD May 17 00:36:05.264000 audit: BPF prog-id=16 op=LOAD May 17 00:36:05.269000 audit: BPF prog-id=17 op=LOAD May 17 00:36:05.269000 audit: BPF prog-id=13 op=UNLOAD May 17 00:36:05.269000 audit: BPF prog-id=14 op=UNLOAD May 17 00:36:05.277000 audit: BPF prog-id=18 op=LOAD May 17 00:36:05.277000 audit: BPF prog-id=15 op=UNLOAD May 17 00:36:05.281000 audit: BPF prog-id=19 op=LOAD May 17 00:36:05.281000 audit: BPF prog-id=20 op=LOAD May 17 00:36:05.281000 audit: BPF prog-id=16 op=UNLOAD May 17 00:36:05.281000 audit: BPF prog-id=17 op=UNLOAD May 17 00:36:05.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.288000 audit: BPF prog-id=18 op=UNLOAD May 17 00:36:05.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.603000 audit: BPF prog-id=21 op=LOAD May 17 00:36:05.603000 audit: BPF prog-id=22 op=LOAD May 17 00:36:05.603000 audit: BPF prog-id=23 op=LOAD May 17 00:36:05.603000 audit: BPF prog-id=19 op=UNLOAD May 17 00:36:05.603000 audit: BPF prog-id=20 op=UNLOAD May 17 00:36:05.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.747000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:36:05.747000 audit[1141]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7fffbc22dec0 a2=4000 a3=7fffbc22df5c items=0 ppid=1 pid=1141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.747000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:36:05.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:53.893258 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:35:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:36:05.234853 systemd[1]: Queued start job for default target multi-user.target. May 17 00:36:05.757010 systemd[1]: Finished modprobe@fuse.service. May 17 00:35:53.909902 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:35:53Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:36:05.234879 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 17 00:35:53.909931 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:35:53Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:36:05.283241 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:35:53.909971 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:35:53Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:35:53.909990 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:35:53Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:35:53.910047 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:35:53Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:35:53.910071 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:35:53Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:35:53.910315 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:35:53Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:35:53.910380 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:35:53Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:35:53.910398 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:35:53Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:35:53.948996 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:35:53Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:35:53.949065 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:35:53Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:35:53.949101 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:35:53Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:35:53.949136 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:35:53Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:35:53.949159 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:35:53Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:35:53.949174 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:35:53Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:36:04.001765 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:36:04Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:36:04.002055 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:36:04Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:36:04.002188 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:36:04Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:36:04.002376 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:36:04Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:36:04.002430 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:36:04Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:36:04.002487 /usr/lib/systemd/system-generators/torcx-generator[1060]: time="2025-05-17T00:36:04Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:36:05.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.766583 systemd[1]: Started systemd-journald.service. May 17 00:36:05.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.767206 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:36:05.767342 systemd[1]: Finished modprobe@loop.service. May 17 00:36:05.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.769253 systemd[1]: Finished systemd-modules-load.service. May 17 00:36:05.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.771270 systemd[1]: Finished systemd-network-generator.service. May 17 00:36:05.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.773513 systemd[1]: Finished systemd-remount-fs.service. May 17 00:36:05.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.775718 systemd[1]: Reached target network-pre.target. May 17 00:36:05.778766 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:36:05.781878 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:36:05.786608 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:36:05.807349 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:36:05.810638 systemd[1]: Starting systemd-journal-flush.service... May 17 00:36:05.812713 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:36:05.813722 systemd[1]: Starting systemd-random-seed.service... May 17 00:36:05.815615 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:36:05.816621 systemd[1]: Starting systemd-sysctl.service... May 17 00:36:05.819405 systemd[1]: Starting systemd-sysusers.service... May 17 00:36:05.823212 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:36:05.825626 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:36:05.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.865733 systemd[1]: Finished systemd-random-seed.service. May 17 00:36:05.868450 systemd[1]: Reached target first-boot-complete.target. May 17 00:36:05.874036 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:36:05.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.877089 systemd[1]: Starting systemd-udev-settle.service... May 17 00:36:05.883992 systemd-journald[1141]: Time spent on flushing to /var/log/journal/2e7d22ed482d47afb404e9e7ccc5debf is 24.484ms for 1161 entries. May 17 00:36:05.883992 systemd-journald[1141]: System Journal (/var/log/journal/2e7d22ed482d47afb404e9e7ccc5debf) is 8.0M, max 2.6G, 2.6G free. May 17 00:36:06.011587 systemd-journald[1141]: Received client request to flush runtime journal. May 17 00:36:05.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:05.897551 systemd[1]: Finished systemd-sysctl.service. May 17 00:36:06.012013 udevadm[1184]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 17 00:36:06.012722 systemd[1]: Finished systemd-journal-flush.service. May 17 00:36:06.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:06.627057 systemd[1]: Finished systemd-sysusers.service. May 17 00:36:06.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:07.286626 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:36:07.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:07.288000 audit: BPF prog-id=24 op=LOAD May 17 00:36:07.288000 audit: BPF prog-id=25 op=LOAD May 17 00:36:07.288000 audit: BPF prog-id=7 op=UNLOAD May 17 00:36:07.288000 audit: BPF prog-id=8 op=UNLOAD May 17 00:36:07.290226 systemd[1]: Starting systemd-udevd.service... May 17 00:36:07.307790 systemd-udevd[1186]: Using default interface naming scheme 'v252'. May 17 00:36:07.510261 systemd[1]: Started systemd-udevd.service. May 17 00:36:07.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:07.513000 audit: BPF prog-id=26 op=LOAD May 17 00:36:07.516364 systemd[1]: Starting systemd-networkd.service... May 17 00:36:07.558627 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:36:07.619000 audit: BPF prog-id=27 op=LOAD May 17 00:36:07.619000 audit: BPF prog-id=28 op=LOAD May 17 00:36:07.619000 audit: BPF prog-id=29 op=LOAD May 17 00:36:07.621623 systemd[1]: Starting systemd-userdbd.service... May 17 00:36:07.642904 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:36:07.670107 kernel: hv_utils: Registering HyperV Utility Driver May 17 00:36:07.670208 kernel: hv_vmbus: registering driver hv_utils May 17 00:36:07.674894 kernel: hv_utils: Heartbeat IC version 3.0 May 17 00:36:07.683929 kernel: hv_utils: Shutdown IC version 3.2 May 17 00:36:07.684009 kernel: hv_utils: TimeSync IC version 4.0 May 17 00:36:07.675000 audit[1194]: AVC avc: denied { confidentiality } for pid=1194 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:36:08.299494 kernel: hv_vmbus: registering driver hyperv_fb May 17 00:36:08.299567 kernel: hv_vmbus: registering driver hv_balloon May 17 00:36:08.301069 systemd[1]: Started systemd-userdbd.service. May 17 00:36:08.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:08.317826 kernel: hyperv_fb: Synthvid Version major 3, minor 5 May 17 00:36:08.317906 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 May 17 00:36:08.317937 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 May 17 00:36:08.333627 kernel: Console: switching to colour dummy device 80x25 May 17 00:36:08.345159 kernel: Console: switching to colour frame buffer device 128x48 May 17 00:36:07.675000 audit[1194]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d9472d6b10 a1=f884 a2=7f64cd5cabc5 a3=5 items=12 ppid=1186 pid=1194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:07.675000 audit: CWD cwd="/" May 17 00:36:07.675000 audit: PATH item=0 name=(null) inode=1237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.675000 audit: PATH item=1 name=(null) inode=15748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.675000 audit: PATH item=2 name=(null) inode=15748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.675000 audit: PATH item=3 name=(null) inode=15749 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.675000 audit: PATH item=4 name=(null) inode=15748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.675000 audit: PATH item=5 name=(null) inode=15750 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.675000 audit: PATH item=6 name=(null) inode=15748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.675000 audit: PATH item=7 name=(null) inode=15751 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.675000 audit: PATH item=8 name=(null) inode=15748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.675000 audit: PATH item=9 name=(null) inode=15752 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.675000 audit: PATH item=10 name=(null) inode=15748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.675000 audit: PATH item=11 name=(null) inode=15753 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:36:07.675000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:36:08.566366 kernel: KVM: vmx: using Hyper-V Enlightened VMCS May 17 00:36:08.582154 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:36:08.676726 systemd[1]: Finished systemd-udev-settle.service. May 17 00:36:08.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:08.680122 systemd[1]: Starting lvm2-activation-early.service... May 17 00:36:08.691713 systemd-networkd[1192]: lo: Link UP May 17 00:36:08.691722 systemd-networkd[1192]: lo: Gained carrier May 17 00:36:08.692265 systemd-networkd[1192]: Enumeration completed May 17 00:36:08.692425 systemd[1]: Started systemd-networkd.service. May 17 00:36:08.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:08.695750 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:36:08.727152 systemd-networkd[1192]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:36:08.778372 kernel: mlx5_core 366c:00:02.0 enP13932s1: Link up May 17 00:36:08.799376 kernel: hv_netvsc 7c1e522c-fc5a-7c1e-522c-fc5a7c1e522c eth0: Data path switched to VF: enP13932s1 May 17 00:36:08.800813 systemd-networkd[1192]: enP13932s1: Link UP May 17 00:36:08.801148 systemd-networkd[1192]: eth0: Link UP May 17 00:36:08.801273 systemd-networkd[1192]: eth0: Gained carrier May 17 00:36:08.803957 systemd-networkd[1192]: enP13932s1: Gained carrier May 17 00:36:08.831570 systemd-networkd[1192]: eth0: DHCPv4 address 10.200.4.17/24, gateway 10.200.4.1 acquired from 168.63.129.16 May 17 00:36:09.055886 lvm[1262]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:36:09.084721 systemd[1]: Finished lvm2-activation-early.service. May 17 00:36:09.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.087398 systemd[1]: Reached target cryptsetup.target. May 17 00:36:09.090825 systemd[1]: Starting lvm2-activation.service... May 17 00:36:09.095404 lvm[1264]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:36:09.114229 systemd[1]: Finished lvm2-activation.service. May 17 00:36:09.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.116599 systemd[1]: Reached target local-fs-pre.target. May 17 00:36:09.118589 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:36:09.118625 systemd[1]: Reached target local-fs.target. May 17 00:36:09.120582 systemd[1]: Reached target machines.target. May 17 00:36:09.123466 systemd[1]: Starting ldconfig.service... May 17 00:36:09.143821 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:36:09.143894 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:36:09.145094 systemd[1]: Starting systemd-boot-update.service... May 17 00:36:09.148049 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:36:09.151659 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:36:09.154954 systemd[1]: Starting systemd-sysext.service... May 17 00:36:09.234318 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:36:09.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.251081 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:36:09.251659 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:36:09.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.253897 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1266 (bootctl) May 17 00:36:09.255138 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:36:09.275983 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:36:09.346238 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:36:09.346526 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:36:09.394365 kernel: loop0: detected capacity change from 0 to 224512 May 17 00:36:09.478389 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:36:09.494367 kernel: loop1: detected capacity change from 0 to 224512 May 17 00:36:09.499982 (sd-sysext)[1278]: Using extensions 'kubernetes'. May 17 00:36:09.500432 (sd-sysext)[1278]: Merged extensions into '/usr'. May 17 00:36:09.515892 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:36:09.517464 systemd[1]: Mounting usr-share-oem.mount... May 17 00:36:09.518677 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:36:09.522447 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:36:09.524630 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:36:09.528921 systemd[1]: Starting modprobe@loop.service... May 17 00:36:09.529915 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:36:09.530037 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:36:09.530140 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:36:09.531458 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:36:09.531624 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:36:09.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.533019 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:36:09.533134 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:36:09.533871 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:36:09.533979 systemd[1]: Finished modprobe@loop.service. May 17 00:36:09.534729 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:36:09.534832 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:36:09.539654 systemd[1]: Mounted usr-share-oem.mount. May 17 00:36:09.542807 systemd[1]: Finished systemd-sysext.service. May 17 00:36:09.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.546255 systemd[1]: Starting ensure-sysext.service... May 17 00:36:09.549399 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:36:09.556237 systemd[1]: Reloading. May 17 00:36:09.625853 /usr/lib/systemd/system-generators/torcx-generator[1305]: time="2025-05-17T00:36:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:36:09.625888 /usr/lib/systemd/system-generators/torcx-generator[1305]: time="2025-05-17T00:36:09Z" level=info msg="torcx already run" May 17 00:36:09.714306 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:36:09.714326 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:36:09.729666 systemd-tmpfiles[1285]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:36:09.730864 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:36:09.797000 audit: BPF prog-id=30 op=LOAD May 17 00:36:09.797000 audit: BPF prog-id=26 op=UNLOAD May 17 00:36:09.799000 audit: BPF prog-id=31 op=LOAD May 17 00:36:09.799000 audit: BPF prog-id=32 op=LOAD May 17 00:36:09.799000 audit: BPF prog-id=24 op=UNLOAD May 17 00:36:09.799000 audit: BPF prog-id=25 op=UNLOAD May 17 00:36:09.799000 audit: BPF prog-id=33 op=LOAD May 17 00:36:09.799000 audit: BPF prog-id=21 op=UNLOAD May 17 00:36:09.800000 audit: BPF prog-id=34 op=LOAD May 17 00:36:09.800000 audit: BPF prog-id=35 op=LOAD May 17 00:36:09.800000 audit: BPF prog-id=22 op=UNLOAD May 17 00:36:09.800000 audit: BPF prog-id=23 op=UNLOAD May 17 00:36:09.801000 audit: BPF prog-id=36 op=LOAD May 17 00:36:09.801000 audit: BPF prog-id=27 op=UNLOAD May 17 00:36:09.801000 audit: BPF prog-id=37 op=LOAD May 17 00:36:09.801000 audit: BPF prog-id=38 op=LOAD May 17 00:36:09.801000 audit: BPF prog-id=28 op=UNLOAD May 17 00:36:09.801000 audit: BPF prog-id=29 op=UNLOAD May 17 00:36:09.815207 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:36:09.815493 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:36:09.816822 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:36:09.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.820587 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:36:09.822887 systemd[1]: Starting modprobe@loop.service... May 17 00:36:09.823824 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:36:09.823981 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:36:09.824142 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:36:09.825221 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:36:09.825430 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:36:09.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.829901 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:36:09.830088 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:36:09.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.832965 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:36:09.833102 systemd[1]: Finished modprobe@loop.service. May 17 00:36:09.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.835448 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:36:09.835738 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:36:09.836964 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:36:09.838827 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:36:09.838975 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:36:09.839107 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:36:09.839218 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:36:09.839892 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:36:09.840035 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:36:09.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.842780 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:36:09.845442 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:36:09.845733 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:36:09.846967 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:36:09.849248 systemd[1]: Starting modprobe@drm.service... May 17 00:36:09.851605 systemd-tmpfiles[1285]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:36:09.852764 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:36:09.854923 systemd[1]: Starting modprobe@loop.service... May 17 00:36:09.856223 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:36:09.856473 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:36:09.856794 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:36:09.858626 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:36:09.858792 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:36:09.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.861192 systemd[1]: Finished ensure-sysext.service. May 17 00:36:09.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.864749 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:36:09.864908 systemd[1]: Finished modprobe@drm.service. May 17 00:36:09.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:09.865913 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:36:09.866033 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:36:09.866618 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:36:09.866724 systemd[1]: Finished modprobe@loop.service. May 17 00:36:09.866883 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:36:09.866913 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:36:09.926016 systemd-tmpfiles[1285]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:36:09.960594 systemd-networkd[1192]: eth0: Gained IPv6LL May 17 00:36:09.966163 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:36:09.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:10.111541 systemd-fsck[1273]: fsck.fat 4.2 (2021-01-31) May 17 00:36:10.111541 systemd-fsck[1273]: /dev/sda1: 790 files, 120726/258078 clusters May 17 00:36:10.113770 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:36:10.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:10.118529 systemd[1]: Mounting boot.mount... May 17 00:36:10.132129 systemd[1]: Mounted boot.mount. May 17 00:36:10.146704 systemd[1]: Finished systemd-boot-update.service. May 17 00:36:10.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:10.543109 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:36:10.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:10.546722 systemd[1]: Starting audit-rules.service... May 17 00:36:10.549729 systemd[1]: Starting clean-ca-certificates.service... May 17 00:36:10.553173 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:36:10.555000 audit: BPF prog-id=39 op=LOAD May 17 00:36:10.559328 systemd[1]: Starting systemd-resolved.service... May 17 00:36:10.560000 audit: BPF prog-id=40 op=LOAD May 17 00:36:10.563200 systemd[1]: Starting systemd-timesyncd.service... May 17 00:36:10.566252 systemd[1]: Starting systemd-update-utmp.service... May 17 00:36:10.576000 audit[1386]: SYSTEM_BOOT pid=1386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:36:10.580058 systemd[1]: Finished systemd-update-utmp.service. May 17 00:36:10.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:10.623616 systemd[1]: Finished clean-ca-certificates.service. May 17 00:36:10.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:10.625634 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:36:10.706048 systemd[1]: Started systemd-timesyncd.service. May 17 00:36:10.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:10.708186 systemd[1]: Reached target time-set.target. May 17 00:36:10.743009 systemd-resolved[1383]: Positive Trust Anchors: May 17 00:36:10.743027 systemd-resolved[1383]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:36:10.743065 systemd-resolved[1383]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:36:10.753381 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:36:10.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:10.803824 systemd-timesyncd[1385]: Contacted time server 162.159.200.123:123 (0.flatcar.pool.ntp.org). May 17 00:36:10.804148 systemd-timesyncd[1385]: Initial clock synchronization to Sat 2025-05-17 00:36:10.805154 UTC. May 17 00:36:10.874830 augenrules[1401]: No rules May 17 00:36:10.886217 kernel: kauditd_printk_skb: 134 callbacks suppressed May 17 00:36:10.886396 kernel: audit: type=1305 audit(1747442170.873:218): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:36:10.873000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:36:10.875220 systemd-resolved[1383]: Using system hostname 'ci-3510.3.7-n-191fd4fe6d'. May 17 00:36:10.876481 systemd[1]: Finished audit-rules.service. May 17 00:36:10.873000 audit[1401]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff407850a0 a2=420 a3=0 items=0 ppid=1380 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:10.887061 systemd[1]: Started systemd-resolved.service. May 17 00:36:10.873000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:36:10.905251 kernel: audit: type=1300 audit(1747442170.873:218): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff407850a0 a2=420 a3=0 items=0 ppid=1380 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:10.906135 kernel: audit: type=1327 audit(1747442170.873:218): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:36:10.907129 systemd[1]: Reached target network.target. May 17 00:36:10.909208 systemd[1]: Reached target network-online.target. May 17 00:36:10.911036 systemd[1]: Reached target nss-lookup.target. May 17 00:36:17.335133 ldconfig[1265]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:36:17.347088 systemd[1]: Finished ldconfig.service. May 17 00:36:17.351002 systemd[1]: Starting systemd-update-done.service... May 17 00:36:17.357780 systemd[1]: Finished systemd-update-done.service. May 17 00:36:17.359984 systemd[1]: Reached target sysinit.target. May 17 00:36:17.361730 systemd[1]: Started motdgen.path. May 17 00:36:17.363196 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:36:17.365834 systemd[1]: Started logrotate.timer. May 17 00:36:17.367389 systemd[1]: Started mdadm.timer. May 17 00:36:17.368761 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:36:17.370619 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:36:17.370655 systemd[1]: Reached target paths.target. May 17 00:36:17.372175 systemd[1]: Reached target timers.target. May 17 00:36:17.374113 systemd[1]: Listening on dbus.socket. May 17 00:36:17.376703 systemd[1]: Starting docker.socket... May 17 00:36:17.380578 systemd[1]: Listening on sshd.socket. May 17 00:36:17.382481 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:36:17.382910 systemd[1]: Listening on docker.socket. May 17 00:36:17.384848 systemd[1]: Reached target sockets.target. May 17 00:36:17.386663 systemd[1]: Reached target basic.target. May 17 00:36:17.388447 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:36:17.388485 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:36:17.389429 systemd[1]: Starting containerd.service... May 17 00:36:17.392191 systemd[1]: Starting dbus.service... May 17 00:36:17.394619 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:36:17.397757 systemd[1]: Starting extend-filesystems.service... May 17 00:36:17.399812 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:36:17.401743 systemd[1]: Starting kubelet.service... May 17 00:36:17.405326 systemd[1]: Starting motdgen.service... May 17 00:36:17.408423 systemd[1]: Started nvidia.service. May 17 00:36:17.413301 systemd[1]: Starting prepare-helm.service... May 17 00:36:17.416426 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:36:17.419795 systemd[1]: Starting sshd-keygen.service... May 17 00:36:17.427488 systemd[1]: Starting systemd-logind.service... May 17 00:36:17.429820 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:36:17.429930 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:36:17.430875 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:36:17.431747 systemd[1]: Starting update-engine.service... May 17 00:36:17.435243 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:36:17.448707 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:36:17.448932 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:36:17.483833 extend-filesystems[1412]: Found loop1 May 17 00:36:17.483833 extend-filesystems[1412]: Found sda May 17 00:36:17.483833 extend-filesystems[1412]: Found sda1 May 17 00:36:17.483833 extend-filesystems[1412]: Found sda2 May 17 00:36:17.483833 extend-filesystems[1412]: Found sda3 May 17 00:36:17.483833 extend-filesystems[1412]: Found usr May 17 00:36:17.483833 extend-filesystems[1412]: Found sda4 May 17 00:36:17.483833 extend-filesystems[1412]: Found sda6 May 17 00:36:17.483833 extend-filesystems[1412]: Found sda7 May 17 00:36:17.483833 extend-filesystems[1412]: Found sda9 May 17 00:36:17.483833 extend-filesystems[1412]: Checking size of /dev/sda9 May 17 00:36:17.516641 jq[1411]: false May 17 00:36:17.516760 jq[1426]: true May 17 00:36:17.491241 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:36:17.491558 systemd[1]: Finished motdgen.service. May 17 00:36:17.498977 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:36:17.499193 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:36:17.528880 jq[1440]: true May 17 00:36:17.550459 env[1439]: time="2025-05-17T00:36:17.550417455Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:36:17.565873 env[1439]: time="2025-05-17T00:36:17.565837998Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:36:17.566079 env[1439]: time="2025-05-17T00:36:17.566063912Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:36:17.567217 env[1439]: time="2025-05-17T00:36:17.567190681Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:36:17.567302 env[1439]: time="2025-05-17T00:36:17.567291087Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:36:17.567546 env[1439]: time="2025-05-17T00:36:17.567528302Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:36:17.567616 env[1439]: time="2025-05-17T00:36:17.567606207Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:36:17.567665 env[1439]: time="2025-05-17T00:36:17.567655310Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:36:17.567705 env[1439]: time="2025-05-17T00:36:17.567697012Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:36:17.567805 env[1439]: time="2025-05-17T00:36:17.567794418Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:36:17.568036 env[1439]: time="2025-05-17T00:36:17.568021732Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:36:17.568252 env[1439]: time="2025-05-17T00:36:17.568234845Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:36:17.568311 env[1439]: time="2025-05-17T00:36:17.568301449Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:36:17.568416 env[1439]: time="2025-05-17T00:36:17.568403255Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:36:17.568471 env[1439]: time="2025-05-17T00:36:17.568462359Z" level=info msg="metadata content store policy set" policy=shared May 17 00:36:17.585201 tar[1430]: linux-amd64/LICENSE May 17 00:36:17.585820 tar[1430]: linux-amd64/helm May 17 00:36:17.589398 env[1439]: time="2025-05-17T00:36:17.589329835Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:36:17.589540 env[1439]: time="2025-05-17T00:36:17.589521547Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:36:17.591991 env[1439]: time="2025-05-17T00:36:17.591964996Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:36:17.592145 env[1439]: time="2025-05-17T00:36:17.592129606Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:36:17.593660 env[1439]: time="2025-05-17T00:36:17.593625098Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:36:17.593770 env[1439]: time="2025-05-17T00:36:17.593751405Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:36:17.593871 env[1439]: time="2025-05-17T00:36:17.593856512Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:36:17.595293 env[1439]: time="2025-05-17T00:36:17.595269798Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:36:17.595440 env[1439]: time="2025-05-17T00:36:17.595421708Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:36:17.597040 env[1439]: time="2025-05-17T00:36:17.596996004Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:36:17.597162 env[1439]: time="2025-05-17T00:36:17.597144913Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:36:17.597260 env[1439]: time="2025-05-17T00:36:17.597245519Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:36:17.597478 env[1439]: time="2025-05-17T00:36:17.597459532Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:36:17.597678 env[1439]: time="2025-05-17T00:36:17.597662645Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:36:17.599597 env[1439]: time="2025-05-17T00:36:17.599575462Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:36:17.599858 env[1439]: time="2025-05-17T00:36:17.599838678Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:36:17.599961 env[1439]: time="2025-05-17T00:36:17.599947784Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:36:17.600120 env[1439]: time="2025-05-17T00:36:17.600103794Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:36:17.601975 env[1439]: time="2025-05-17T00:36:17.601951807Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:36:17.602090 env[1439]: time="2025-05-17T00:36:17.602073914Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:36:17.602173 env[1439]: time="2025-05-17T00:36:17.602159620Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:36:17.602253 env[1439]: time="2025-05-17T00:36:17.602241525Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:36:17.602336 env[1439]: time="2025-05-17T00:36:17.602321830Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:36:17.602828 env[1439]: time="2025-05-17T00:36:17.602807459Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:36:17.602933 env[1439]: time="2025-05-17T00:36:17.602917766Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:36:17.603023 env[1439]: time="2025-05-17T00:36:17.603009272Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:36:17.603282 env[1439]: time="2025-05-17T00:36:17.603264987Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:36:17.604527 env[1439]: time="2025-05-17T00:36:17.604504963Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:36:17.604648 env[1439]: time="2025-05-17T00:36:17.604632371Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:36:17.604735 env[1439]: time="2025-05-17T00:36:17.604720576Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:36:17.604833 env[1439]: time="2025-05-17T00:36:17.604817082Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:36:17.604912 env[1439]: time="2025-05-17T00:36:17.604896487Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:36:17.605015 env[1439]: time="2025-05-17T00:36:17.605000293Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:36:17.605122 env[1439]: time="2025-05-17T00:36:17.605108600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:36:17.605558 env[1439]: time="2025-05-17T00:36:17.605473422Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:36:17.643388 env[1439]: time="2025-05-17T00:36:17.605712337Z" level=info msg="Connect containerd service" May 17 00:36:17.643388 env[1439]: time="2025-05-17T00:36:17.605756740Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:36:17.643388 env[1439]: time="2025-05-17T00:36:17.627995100Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:36:17.643388 env[1439]: time="2025-05-17T00:36:17.632291862Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:36:17.643388 env[1439]: time="2025-05-17T00:36:17.632361367Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:36:17.643388 env[1439]: time="2025-05-17T00:36:17.632423770Z" level=info msg="containerd successfully booted in 0.082743s" May 17 00:36:17.643388 env[1439]: time="2025-05-17T00:36:17.633745051Z" level=info msg="Start subscribing containerd event" May 17 00:36:17.643388 env[1439]: time="2025-05-17T00:36:17.633873759Z" level=info msg="Start recovering state" May 17 00:36:17.643388 env[1439]: time="2025-05-17T00:36:17.634066471Z" level=info msg="Start event monitor" May 17 00:36:17.643388 env[1439]: time="2025-05-17T00:36:17.634133775Z" level=info msg="Start snapshots syncer" May 17 00:36:17.643388 env[1439]: time="2025-05-17T00:36:17.634147376Z" level=info msg="Start cni network conf syncer for default" May 17 00:36:17.643388 env[1439]: time="2025-05-17T00:36:17.634157676Z" level=info msg="Start streaming server" May 17 00:36:17.622419 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:36:17.643915 extend-filesystems[1412]: Old size kept for /dev/sda9 May 17 00:36:17.643915 extend-filesystems[1412]: Found sr0 May 17 00:36:17.622639 systemd[1]: Finished extend-filesystems.service. May 17 00:36:17.632482 systemd[1]: Started containerd.service. May 17 00:36:17.702396 systemd-logind[1422]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:36:17.703063 systemd-logind[1422]: New seat seat0. May 17 00:36:17.800332 dbus-daemon[1410]: [system] SELinux support is enabled May 17 00:36:17.800517 systemd[1]: Started dbus.service. May 17 00:36:17.804677 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:36:17.804701 systemd[1]: Reached target system-config.target. May 17 00:36:17.807095 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:36:17.807125 systemd[1]: Reached target user-config.target. May 17 00:36:17.814632 systemd[1]: Started systemd-logind.service. May 17 00:36:17.819363 bash[1465]: Updated "/home/core/.ssh/authorized_keys" May 17 00:36:17.820527 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:36:17.823788 dbus-daemon[1410]: [system] Successfully activated service 'org.freedesktop.systemd1' May 17 00:36:17.922875 systemd[1]: nvidia.service: Deactivated successfully. May 17 00:36:18.367962 tar[1430]: linux-amd64/README.md May 17 00:36:18.375764 systemd[1]: Finished prepare-helm.service. May 17 00:36:18.520470 update_engine[1425]: I0517 00:36:18.518962 1425 main.cc:92] Flatcar Update Engine starting May 17 00:36:18.591919 systemd[1]: Started update-engine.service. May 17 00:36:18.593294 update_engine[1425]: I0517 00:36:18.593189 1425 update_check_scheduler.cc:74] Next update check in 8m42s May 17 00:36:18.596589 systemd[1]: Started locksmithd.service. May 17 00:36:19.024909 systemd[1]: Started kubelet.service. May 17 00:36:19.096215 sshd_keygen[1431]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:36:19.125102 systemd[1]: Finished sshd-keygen.service. May 17 00:36:19.129204 systemd[1]: Starting issuegen.service... May 17 00:36:19.132308 systemd[1]: Started waagent.service. May 17 00:36:19.138782 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:36:19.138971 systemd[1]: Finished issuegen.service. May 17 00:36:19.142570 systemd[1]: Starting systemd-user-sessions.service... May 17 00:36:19.167920 systemd[1]: Finished systemd-user-sessions.service. May 17 00:36:19.171929 systemd[1]: Started getty@tty1.service. May 17 00:36:19.176527 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:36:19.179671 systemd[1]: Reached target getty.target. May 17 00:36:19.181716 systemd[1]: Reached target multi-user.target. May 17 00:36:19.186250 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:36:19.198935 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:36:19.199113 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:36:19.201628 systemd[1]: Startup finished in 922ms (firmware) + 33.484s (loader) + 954ms (kernel) + 14.782s (initrd) + 28.096s (userspace) = 1min 18.240s. May 17 00:36:19.587399 kubelet[1518]: E0517 00:36:19.587333 1518 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:36:19.588972 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:36:19.589139 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:36:19.589454 systemd[1]: kubelet.service: Consumed 1.080s CPU time. May 17 00:36:19.788706 login[1536]: pam_lastlog(login:session): file /var/log/lastlog is locked/write May 17 00:36:19.812937 login[1538]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:36:19.874792 systemd[1]: Created slice user-500.slice. May 17 00:36:19.876229 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:36:19.880192 systemd-logind[1422]: New session 1 of user core. May 17 00:36:19.887133 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:36:19.889122 systemd[1]: Starting user@500.service... May 17 00:36:19.892705 (systemd)[1546]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:20.094485 systemd[1546]: Queued start job for default target default.target. May 17 00:36:20.095070 systemd[1546]: Reached target paths.target. May 17 00:36:20.095098 systemd[1546]: Reached target sockets.target. May 17 00:36:20.095115 systemd[1546]: Reached target timers.target. May 17 00:36:20.095129 systemd[1546]: Reached target basic.target. May 17 00:36:20.095251 systemd[1]: Started user@500.service. May 17 00:36:20.096480 systemd[1]: Started session-1.scope. May 17 00:36:20.096992 systemd[1546]: Reached target default.target. May 17 00:36:20.097172 systemd[1546]: Startup finished in 198ms. May 17 00:36:20.329824 locksmithd[1515]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:36:20.789144 login[1536]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:36:20.794699 systemd-logind[1422]: New session 2 of user core. May 17 00:36:20.795430 systemd[1]: Started session-2.scope. May 17 00:36:26.529515 waagent[1527]: 2025-05-17T00:36:26.529384Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 May 17 00:36:26.533864 waagent[1527]: 2025-05-17T00:36:26.533768Z INFO Daemon Daemon OS: flatcar 3510.3.7 May 17 00:36:26.536397 waagent[1527]: 2025-05-17T00:36:26.536321Z INFO Daemon Daemon Python: 3.9.16 May 17 00:36:26.538682 waagent[1527]: 2025-05-17T00:36:26.538602Z INFO Daemon Daemon Run daemon May 17 00:36:26.541109 waagent[1527]: 2025-05-17T00:36:26.540943Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.7' May 17 00:36:26.553640 waagent[1527]: 2025-05-17T00:36:26.553523Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 17 00:36:26.560030 waagent[1527]: 2025-05-17T00:36:26.559926Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 17 00:36:26.597679 waagent[1527]: 2025-05-17T00:36:26.560322Z INFO Daemon Daemon cloud-init is enabled: False May 17 00:36:26.597679 waagent[1527]: 2025-05-17T00:36:26.561003Z INFO Daemon Daemon Using waagent for provisioning May 17 00:36:26.597679 waagent[1527]: 2025-05-17T00:36:26.562279Z INFO Daemon Daemon Activate resource disk May 17 00:36:26.597679 waagent[1527]: 2025-05-17T00:36:26.562923Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb May 17 00:36:26.597679 waagent[1527]: 2025-05-17T00:36:26.570552Z INFO Daemon Daemon Found device: None May 17 00:36:26.597679 waagent[1527]: 2025-05-17T00:36:26.571145Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology May 17 00:36:26.597679 waagent[1527]: 2025-05-17T00:36:26.571896Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 May 17 00:36:26.597679 waagent[1527]: 2025-05-17T00:36:26.573517Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 17 00:36:26.597679 waagent[1527]: 2025-05-17T00:36:26.574238Z INFO Daemon Daemon Running default provisioning handler May 17 00:36:26.597679 waagent[1527]: 2025-05-17T00:36:26.583937Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 17 00:36:26.597679 waagent[1527]: 2025-05-17T00:36:26.586483Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 17 00:36:26.597679 waagent[1527]: 2025-05-17T00:36:26.587306Z INFO Daemon Daemon cloud-init is enabled: False May 17 00:36:26.597679 waagent[1527]: 2025-05-17T00:36:26.587971Z INFO Daemon Daemon Copying ovf-env.xml May 17 00:36:26.708966 waagent[1527]: 2025-05-17T00:36:26.708808Z INFO Daemon Daemon Successfully mounted dvd May 17 00:36:26.789142 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. May 17 00:36:26.809397 waagent[1527]: 2025-05-17T00:36:26.809254Z INFO Daemon Daemon Detect protocol endpoint May 17 00:36:26.811964 waagent[1527]: 2025-05-17T00:36:26.811891Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 17 00:36:26.815192 waagent[1527]: 2025-05-17T00:36:26.815117Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler May 17 00:36:26.819171 waagent[1527]: 2025-05-17T00:36:26.819103Z INFO Daemon Daemon Test for route to 168.63.129.16 May 17 00:36:26.822580 waagent[1527]: 2025-05-17T00:36:26.822520Z INFO Daemon Daemon Route to 168.63.129.16 exists May 17 00:36:26.825781 waagent[1527]: 2025-05-17T00:36:26.825708Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 May 17 00:36:26.945747 waagent[1527]: 2025-05-17T00:36:26.945672Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 May 17 00:36:26.953965 waagent[1527]: 2025-05-17T00:36:26.946646Z INFO Daemon Daemon Wire protocol version:2012-11-30 May 17 00:36:26.953965 waagent[1527]: 2025-05-17T00:36:26.948160Z INFO Daemon Daemon Server preferred version:2015-04-05 May 17 00:36:27.439874 waagent[1527]: 2025-05-17T00:36:27.439726Z INFO Daemon Daemon Initializing goal state during protocol detection May 17 00:36:27.447741 waagent[1527]: 2025-05-17T00:36:27.447666Z INFO Daemon Daemon Forcing an update of the goal state.. May 17 00:36:27.452054 waagent[1527]: 2025-05-17T00:36:27.448006Z INFO Daemon Daemon Fetching goal state [incarnation 1] May 17 00:36:27.566984 waagent[1527]: 2025-05-17T00:36:27.566863Z INFO Daemon Daemon Found private key matching thumbprint 4B3F247CC34DAF5D28A116294C4308EFC3A7DA78 May 17 00:36:27.574841 waagent[1527]: 2025-05-17T00:36:27.574758Z INFO Daemon Daemon Fetch goal state completed May 17 00:36:27.612689 waagent[1527]: 2025-05-17T00:36:27.612610Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 7af0e9af-05a7-43b6-99a3-4621bbefdc08 New eTag: 7879624694105596514] May 17 00:36:27.618005 waagent[1527]: 2025-05-17T00:36:27.617918Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob May 17 00:36:27.628804 waagent[1527]: 2025-05-17T00:36:27.628742Z INFO Daemon Daemon Starting provisioning May 17 00:36:27.631398 waagent[1527]: 2025-05-17T00:36:27.631321Z INFO Daemon Daemon Handle ovf-env.xml. May 17 00:36:27.633879 waagent[1527]: 2025-05-17T00:36:27.633820Z INFO Daemon Daemon Set hostname [ci-3510.3.7-n-191fd4fe6d] May 17 00:36:27.655435 waagent[1527]: 2025-05-17T00:36:27.655288Z INFO Daemon Daemon Publish hostname [ci-3510.3.7-n-191fd4fe6d] May 17 00:36:27.658880 waagent[1527]: 2025-05-17T00:36:27.658799Z INFO Daemon Daemon Examine /proc/net/route for primary interface May 17 00:36:27.663319 waagent[1527]: 2025-05-17T00:36:27.663250Z INFO Daemon Daemon Primary interface is [eth0] May 17 00:36:27.678757 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. May 17 00:36:27.679015 systemd[1]: Stopped systemd-networkd-wait-online.service. May 17 00:36:27.679090 systemd[1]: Stopping systemd-networkd-wait-online.service... May 17 00:36:27.679445 systemd[1]: Stopping systemd-networkd.service... May 17 00:36:27.684386 systemd-networkd[1192]: eth0: DHCPv6 lease lost May 17 00:36:27.685688 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:36:27.685848 systemd[1]: Stopped systemd-networkd.service. May 17 00:36:27.688331 systemd[1]: Starting systemd-networkd.service... May 17 00:36:27.719636 systemd-networkd[1588]: enP13932s1: Link UP May 17 00:36:27.719645 systemd-networkd[1588]: enP13932s1: Gained carrier May 17 00:36:27.720941 systemd-networkd[1588]: eth0: Link UP May 17 00:36:27.720950 systemd-networkd[1588]: eth0: Gained carrier May 17 00:36:27.721388 systemd-networkd[1588]: lo: Link UP May 17 00:36:27.721397 systemd-networkd[1588]: lo: Gained carrier May 17 00:36:27.721709 systemd-networkd[1588]: eth0: Gained IPv6LL May 17 00:36:27.722814 systemd-networkd[1588]: Enumeration completed May 17 00:36:27.722914 systemd[1]: Started systemd-networkd.service. May 17 00:36:27.727225 waagent[1527]: 2025-05-17T00:36:27.724197Z INFO Daemon Daemon Create user account if not exists May 17 00:36:27.727225 waagent[1527]: 2025-05-17T00:36:27.724958Z INFO Daemon Daemon User core already exists, skip useradd May 17 00:36:27.727225 waagent[1527]: 2025-05-17T00:36:27.725959Z INFO Daemon Daemon Configure sudoer May 17 00:36:27.727676 waagent[1527]: 2025-05-17T00:36:27.727617Z INFO Daemon Daemon Configure sshd May 17 00:36:27.728719 waagent[1527]: 2025-05-17T00:36:27.728665Z INFO Daemon Daemon Deploy ssh public key. May 17 00:36:27.736551 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:36:27.740418 systemd-networkd[1588]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:36:27.763415 systemd-networkd[1588]: eth0: DHCPv4 address 10.200.4.17/24, gateway 10.200.4.1 acquired from 168.63.129.16 May 17 00:36:27.766303 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:36:28.852717 waagent[1527]: 2025-05-17T00:36:28.852614Z INFO Daemon Daemon Provisioning complete May 17 00:36:28.867352 waagent[1527]: 2025-05-17T00:36:28.867258Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping May 17 00:36:28.870527 waagent[1527]: 2025-05-17T00:36:28.870453Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. May 17 00:36:28.875533 waagent[1527]: 2025-05-17T00:36:28.875466Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent May 17 00:36:29.141493 waagent[1594]: 2025-05-17T00:36:29.141384Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent May 17 00:36:29.142274 waagent[1594]: 2025-05-17T00:36:29.142203Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:36:29.142443 waagent[1594]: 2025-05-17T00:36:29.142385Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:36:29.153495 waagent[1594]: 2025-05-17T00:36:29.153423Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. May 17 00:36:29.153661 waagent[1594]: 2025-05-17T00:36:29.153607Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] May 17 00:36:29.205205 waagent[1594]: 2025-05-17T00:36:29.205073Z INFO ExtHandler ExtHandler Found private key matching thumbprint 4B3F247CC34DAF5D28A116294C4308EFC3A7DA78 May 17 00:36:29.205533 waagent[1594]: 2025-05-17T00:36:29.205470Z INFO ExtHandler ExtHandler Fetch goal state completed May 17 00:36:29.217708 waagent[1594]: 2025-05-17T00:36:29.217640Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: caec3d54-a65d-4360-b691-4c80bab07c57 New eTag: 7879624694105596514] May 17 00:36:29.218230 waagent[1594]: 2025-05-17T00:36:29.218169Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob May 17 00:36:29.316836 waagent[1594]: 2025-05-17T00:36:29.316691Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; May 17 00:36:29.342544 waagent[1594]: 2025-05-17T00:36:29.342442Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1594 May 17 00:36:29.346391 waagent[1594]: 2025-05-17T00:36:29.346298Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 17 00:36:29.347702 waagent[1594]: 2025-05-17T00:36:29.347637Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules May 17 00:36:29.527923 waagent[1594]: 2025-05-17T00:36:29.527801Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 17 00:36:29.528271 waagent[1594]: 2025-05-17T00:36:29.528207Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 17 00:36:29.536336 waagent[1594]: 2025-05-17T00:36:29.536280Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 17 00:36:29.536873 waagent[1594]: 2025-05-17T00:36:29.536809Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 17 00:36:29.537938 waagent[1594]: 2025-05-17T00:36:29.537869Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] May 17 00:36:29.539194 waagent[1594]: 2025-05-17T00:36:29.539134Z INFO ExtHandler ExtHandler Starting env monitor service. May 17 00:36:29.540029 waagent[1594]: 2025-05-17T00:36:29.539973Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 17 00:36:29.540151 waagent[1594]: 2025-05-17T00:36:29.540088Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:36:29.540743 waagent[1594]: 2025-05-17T00:36:29.540686Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:36:29.540964 waagent[1594]: 2025-05-17T00:36:29.540910Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:36:29.541165 waagent[1594]: 2025-05-17T00:36:29.541111Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 17 00:36:29.542017 waagent[1594]: 2025-05-17T00:36:29.541949Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 17 00:36:29.542165 waagent[1594]: 2025-05-17T00:36:29.542110Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 17 00:36:29.542821 waagent[1594]: 2025-05-17T00:36:29.542767Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:36:29.543353 waagent[1594]: 2025-05-17T00:36:29.543281Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 17 00:36:29.543495 waagent[1594]: 2025-05-17T00:36:29.543436Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 17 00:36:29.543495 waagent[1594]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 17 00:36:29.543495 waagent[1594]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 May 17 00:36:29.543495 waagent[1594]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 17 00:36:29.543495 waagent[1594]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 17 00:36:29.543495 waagent[1594]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:36:29.543495 waagent[1594]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:36:29.546021 waagent[1594]: 2025-05-17T00:36:29.545727Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 17 00:36:29.546939 waagent[1594]: 2025-05-17T00:36:29.546879Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 17 00:36:29.548401 waagent[1594]: 2025-05-17T00:36:29.548315Z INFO EnvHandler ExtHandler Configure routes May 17 00:36:29.550469 waagent[1594]: 2025-05-17T00:36:29.550415Z INFO EnvHandler ExtHandler Gateway:None May 17 00:36:29.550610 waagent[1594]: 2025-05-17T00:36:29.550563Z INFO EnvHandler ExtHandler Routes:None May 17 00:36:29.560231 waagent[1594]: 2025-05-17T00:36:29.560156Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) May 17 00:36:29.561738 waagent[1594]: 2025-05-17T00:36:29.561688Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 17 00:36:29.563546 waagent[1594]: 2025-05-17T00:36:29.563489Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' May 17 00:36:29.604788 waagent[1594]: 2025-05-17T00:36:29.604692Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. May 17 00:36:29.612149 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 00:36:29.612469 systemd[1]: Stopped kubelet.service. May 17 00:36:29.612519 systemd[1]: kubelet.service: Consumed 1.080s CPU time. May 17 00:36:29.614224 systemd[1]: Starting kubelet.service... May 17 00:36:29.621291 waagent[1594]: 2025-05-17T00:36:29.621222Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1588' May 17 00:36:30.382286 systemd[1]: Started kubelet.service. May 17 00:36:30.438662 kubelet[1623]: E0517 00:36:30.438610 1623 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:36:30.444722 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:36:30.444882 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:36:30.446613 waagent[1594]: 2025-05-17T00:36:30.446503Z INFO MonitorHandler ExtHandler Network interfaces: May 17 00:36:30.446613 waagent[1594]: Executing ['ip', '-a', '-o', 'link']: May 17 00:36:30.446613 waagent[1594]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 17 00:36:30.446613 waagent[1594]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:2c:fc:5a brd ff:ff:ff:ff:ff:ff May 17 00:36:30.446613 waagent[1594]: 3: enP13932s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:2c:fc:5a brd ff:ff:ff:ff:ff:ff\ altname enP13932p0s2 May 17 00:36:30.446613 waagent[1594]: Executing ['ip', '-4', '-a', '-o', 'address']: May 17 00:36:30.446613 waagent[1594]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 17 00:36:30.446613 waagent[1594]: 2: eth0 inet 10.200.4.17/24 metric 1024 brd 10.200.4.255 scope global eth0\ valid_lft forever preferred_lft forever May 17 00:36:30.446613 waagent[1594]: Executing ['ip', '-6', '-a', '-o', 'address']: May 17 00:36:30.446613 waagent[1594]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 17 00:36:30.446613 waagent[1594]: 2: eth0 inet6 fe80::7e1e:52ff:fe2c:fc5a/64 scope link \ valid_lft forever preferred_lft forever May 17 00:36:30.513077 waagent[1594]: 2025-05-17T00:36:30.513012Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.13.1.1 -- exiting May 17 00:36:30.880229 waagent[1527]: 2025-05-17T00:36:30.880068Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running May 17 00:36:30.885515 waagent[1527]: 2025-05-17T00:36:30.885450Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.13.1.1 to be the latest agent May 17 00:36:31.986010 waagent[1632]: 2025-05-17T00:36:31.985903Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.13.1.1) May 17 00:36:31.987251 waagent[1632]: 2025-05-17T00:36:31.987182Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.7 May 17 00:36:31.987411 waagent[1632]: 2025-05-17T00:36:31.987355Z INFO ExtHandler ExtHandler Python: 3.9.16 May 17 00:36:31.987559 waagent[1632]: 2025-05-17T00:36:31.987512Z INFO ExtHandler ExtHandler CPU Arch: x86_64 May 17 00:36:32.002737 waagent[1632]: 2025-05-17T00:36:32.002638Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; May 17 00:36:32.003125 waagent[1632]: 2025-05-17T00:36:32.003069Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:36:32.003286 waagent[1632]: 2025-05-17T00:36:32.003237Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:36:32.003524 waagent[1632]: 2025-05-17T00:36:32.003473Z INFO ExtHandler ExtHandler Initializing the goal state... May 17 00:36:32.015354 waagent[1632]: 2025-05-17T00:36:32.015280Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] May 17 00:36:32.026526 waagent[1632]: 2025-05-17T00:36:32.026469Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.166 May 17 00:36:32.027426 waagent[1632]: 2025-05-17T00:36:32.027369Z INFO ExtHandler May 17 00:36:32.027575 waagent[1632]: 2025-05-17T00:36:32.027526Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 86553eb1-1f22-47b8-83ee-921ba775cee9 eTag: 7879624694105596514 source: Fabric] May 17 00:36:32.028251 waagent[1632]: 2025-05-17T00:36:32.028196Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. May 17 00:36:32.029322 waagent[1632]: 2025-05-17T00:36:32.029264Z INFO ExtHandler May 17 00:36:32.029474 waagent[1632]: 2025-05-17T00:36:32.029422Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] May 17 00:36:32.035442 waagent[1632]: 2025-05-17T00:36:32.035391Z INFO ExtHandler ExtHandler Downloading artifacts profile blob May 17 00:36:32.035844 waagent[1632]: 2025-05-17T00:36:32.035797Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 17 00:36:32.054089 waagent[1632]: 2025-05-17T00:36:32.054026Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. May 17 00:36:32.107787 waagent[1632]: 2025-05-17T00:36:32.107658Z INFO ExtHandler Downloaded certificate {'thumbprint': '4B3F247CC34DAF5D28A116294C4308EFC3A7DA78', 'hasPrivateKey': True} May 17 00:36:32.108967 waagent[1632]: 2025-05-17T00:36:32.108899Z INFO ExtHandler Fetch goal state from WireServer completed May 17 00:36:32.109792 waagent[1632]: 2025-05-17T00:36:32.109733Z INFO ExtHandler ExtHandler Goal state initialization completed. May 17 00:36:32.128415 waagent[1632]: 2025-05-17T00:36:32.128305Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) May 17 00:36:32.136123 waagent[1632]: 2025-05-17T00:36:32.136032Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 17 00:36:32.139495 waagent[1632]: 2025-05-17T00:36:32.139402Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] May 17 00:36:32.139693 waagent[1632]: 2025-05-17T00:36:32.139643Z INFO ExtHandler ExtHandler Checking state of the firewall May 17 00:36:32.398925 waagent[1632]: 2025-05-17T00:36:32.398798Z INFO ExtHandler ExtHandler Created firewall rules for Azure Fabric: May 17 00:36:32.398925 waagent[1632]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:36:32.398925 waagent[1632]: pkts bytes target prot opt in out source destination May 17 00:36:32.398925 waagent[1632]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 17 00:36:32.398925 waagent[1632]: pkts bytes target prot opt in out source destination May 17 00:36:32.398925 waagent[1632]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:36:32.398925 waagent[1632]: pkts bytes target prot opt in out source destination May 17 00:36:32.398925 waagent[1632]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 May 17 00:36:32.398925 waagent[1632]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 17 00:36:32.398925 waagent[1632]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 17 00:36:32.400050 waagent[1632]: 2025-05-17T00:36:32.399984Z INFO ExtHandler ExtHandler Setting up persistent firewall rules May 17 00:36:32.402653 waagent[1632]: 2025-05-17T00:36:32.402556Z INFO ExtHandler ExtHandler The firewalld service is not present on the system May 17 00:36:32.402893 waagent[1632]: 2025-05-17T00:36:32.402842Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 17 00:36:32.403260 waagent[1632]: 2025-05-17T00:36:32.403203Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 17 00:36:32.411532 waagent[1632]: 2025-05-17T00:36:32.411479Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 17 00:36:32.411989 waagent[1632]: 2025-05-17T00:36:32.411932Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 17 00:36:32.419213 waagent[1632]: 2025-05-17T00:36:32.419150Z INFO ExtHandler ExtHandler WALinuxAgent-2.13.1.1 running as process 1632 May 17 00:36:32.422108 waagent[1632]: 2025-05-17T00:36:32.422048Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 17 00:36:32.422840 waagent[1632]: 2025-05-17T00:36:32.422782Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled May 17 00:36:32.423641 waagent[1632]: 2025-05-17T00:36:32.423584Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False May 17 00:36:32.426063 waagent[1632]: 2025-05-17T00:36:32.426002Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] May 17 00:36:32.427299 waagent[1632]: 2025-05-17T00:36:32.427242Z INFO ExtHandler ExtHandler Starting env monitor service. May 17 00:36:32.427754 waagent[1632]: 2025-05-17T00:36:32.427698Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:36:32.427908 waagent[1632]: 2025-05-17T00:36:32.427861Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:36:32.428426 waagent[1632]: 2025-05-17T00:36:32.428361Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 17 00:36:32.428785 waagent[1632]: 2025-05-17T00:36:32.428728Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 17 00:36:32.429446 waagent[1632]: 2025-05-17T00:36:32.429393Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:36:32.429581 waagent[1632]: 2025-05-17T00:36:32.429529Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 17 00:36:32.429581 waagent[1632]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 17 00:36:32.429581 waagent[1632]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 May 17 00:36:32.429581 waagent[1632]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 17 00:36:32.429581 waagent[1632]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 17 00:36:32.429581 waagent[1632]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:36:32.429581 waagent[1632]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:36:32.432842 waagent[1632]: 2025-05-17T00:36:32.432763Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:36:32.433329 waagent[1632]: 2025-05-17T00:36:32.433267Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 17 00:36:32.433703 waagent[1632]: 2025-05-17T00:36:32.433649Z INFO EnvHandler ExtHandler Configure routes May 17 00:36:32.434168 waagent[1632]: 2025-05-17T00:36:32.434104Z INFO EnvHandler ExtHandler Gateway:None May 17 00:36:32.434253 waagent[1632]: 2025-05-17T00:36:32.434195Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 17 00:36:32.437298 waagent[1632]: 2025-05-17T00:36:32.437097Z INFO EnvHandler ExtHandler Routes:None May 17 00:36:32.437852 waagent[1632]: 2025-05-17T00:36:32.437774Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 17 00:36:32.438300 waagent[1632]: 2025-05-17T00:36:32.438227Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 17 00:36:32.443330 waagent[1632]: 2025-05-17T00:36:32.443267Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 17 00:36:32.463131 waagent[1632]: 2025-05-17T00:36:32.463041Z INFO MonitorHandler ExtHandler Network interfaces: May 17 00:36:32.463131 waagent[1632]: Executing ['ip', '-a', '-o', 'link']: May 17 00:36:32.463131 waagent[1632]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 17 00:36:32.463131 waagent[1632]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:2c:fc:5a brd ff:ff:ff:ff:ff:ff May 17 00:36:32.463131 waagent[1632]: 3: enP13932s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:2c:fc:5a brd ff:ff:ff:ff:ff:ff\ altname enP13932p0s2 May 17 00:36:32.463131 waagent[1632]: Executing ['ip', '-4', '-a', '-o', 'address']: May 17 00:36:32.463131 waagent[1632]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 17 00:36:32.463131 waagent[1632]: 2: eth0 inet 10.200.4.17/24 metric 1024 brd 10.200.4.255 scope global eth0\ valid_lft forever preferred_lft forever May 17 00:36:32.463131 waagent[1632]: Executing ['ip', '-6', '-a', '-o', 'address']: May 17 00:36:32.463131 waagent[1632]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 17 00:36:32.463131 waagent[1632]: 2: eth0 inet6 fe80::7e1e:52ff:fe2c:fc5a/64 scope link \ valid_lft forever preferred_lft forever May 17 00:36:32.464258 waagent[1632]: 2025-05-17T00:36:32.464183Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 17 00:36:32.465750 waagent[1632]: 2025-05-17T00:36:32.465705Z INFO ExtHandler ExtHandler Downloading agent manifest May 17 00:36:32.495535 waagent[1632]: 2025-05-17T00:36:32.495463Z INFO ExtHandler ExtHandler May 17 00:36:32.495686 waagent[1632]: 2025-05-17T00:36:32.495630Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 2f7fa4ef-7387-4204-ac94-fc5fa2bcff05 correlation 2af0d716-64f5-4f58-b438-2775bc2784a3 created: 2025-05-17T00:34:51.352470Z] May 17 00:36:32.496497 waagent[1632]: 2025-05-17T00:36:32.496441Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. May 17 00:36:32.498094 waagent[1632]: 2025-05-17T00:36:32.498039Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 2 ms] May 17 00:36:32.516097 waagent[1632]: 2025-05-17T00:36:32.516035Z INFO ExtHandler ExtHandler Looking for existing remote access users. May 17 00:36:32.521547 waagent[1632]: 2025-05-17T00:36:32.521491Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.13.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: C9492F2D-D8E1-4119-9D47-266632AECE03;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] May 17 00:36:32.521776 waagent[1632]: 2025-05-17T00:36:32.521724Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 May 17 00:36:38.376929 systemd[1]: Created slice system-sshd.slice. May 17 00:36:38.379126 systemd[1]: Started sshd@0-10.200.4.17:22-10.200.16.10:38004.service. May 17 00:36:39.281494 sshd[1674]: Accepted publickey for core from 10.200.16.10 port 38004 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:36:39.283082 sshd[1674]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:39.287402 systemd-logind[1422]: New session 3 of user core. May 17 00:36:39.288075 systemd[1]: Started session-3.scope. May 17 00:36:39.797509 systemd[1]: Started sshd@1-10.200.4.17:22-10.200.16.10:56980.service. May 17 00:36:40.394911 sshd[1679]: Accepted publickey for core from 10.200.16.10 port 56980 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:36:40.396601 sshd[1679]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:40.401265 systemd[1]: Started session-4.scope. May 17 00:36:40.401760 systemd-logind[1422]: New session 4 of user core. May 17 00:36:40.613888 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 17 00:36:40.614194 systemd[1]: Stopped kubelet.service. May 17 00:36:40.616207 systemd[1]: Starting kubelet.service... May 17 00:36:40.710844 systemd[1]: Started kubelet.service. May 17 00:36:40.818035 sshd[1679]: pam_unix(sshd:session): session closed for user core May 17 00:36:40.820839 systemd[1]: sshd@1-10.200.4.17:22-10.200.16.10:56980.service: Deactivated successfully. May 17 00:36:40.822033 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:36:40.822061 systemd-logind[1422]: Session 4 logged out. Waiting for processes to exit. May 17 00:36:40.823214 systemd-logind[1422]: Removed session 4. May 17 00:36:40.917822 systemd[1]: Started sshd@2-10.200.4.17:22-10.200.16.10:56984.service. May 17 00:36:41.428915 kubelet[1686]: E0517 00:36:41.428871 1686 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:36:41.430507 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:36:41.430661 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:36:41.528820 sshd[1694]: Accepted publickey for core from 10.200.16.10 port 56984 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:36:41.530510 sshd[1694]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:41.535748 systemd[1]: Started session-5.scope. May 17 00:36:41.536192 systemd-logind[1422]: New session 5 of user core. May 17 00:36:41.947870 sshd[1694]: pam_unix(sshd:session): session closed for user core May 17 00:36:41.950692 systemd[1]: sshd@2-10.200.4.17:22-10.200.16.10:56984.service: Deactivated successfully. May 17 00:36:41.951545 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:36:41.952142 systemd-logind[1422]: Session 5 logged out. Waiting for processes to exit. May 17 00:36:41.952911 systemd-logind[1422]: Removed session 5. May 17 00:36:42.047647 systemd[1]: Started sshd@3-10.200.4.17:22-10.200.16.10:56998.service. May 17 00:36:42.646646 sshd[1700]: Accepted publickey for core from 10.200.16.10 port 56998 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:36:42.648228 sshd[1700]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:42.652943 systemd[1]: Started session-6.scope. May 17 00:36:42.653549 systemd-logind[1422]: New session 6 of user core. May 17 00:36:43.070401 sshd[1700]: pam_unix(sshd:session): session closed for user core May 17 00:36:43.073733 systemd[1]: sshd@3-10.200.4.17:22-10.200.16.10:56998.service: Deactivated successfully. May 17 00:36:43.074626 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:36:43.075272 systemd-logind[1422]: Session 6 logged out. Waiting for processes to exit. May 17 00:36:43.076098 systemd-logind[1422]: Removed session 6. May 17 00:36:43.169463 systemd[1]: Started sshd@4-10.200.4.17:22-10.200.16.10:57004.service. May 17 00:36:43.764959 sshd[1706]: Accepted publickey for core from 10.200.16.10 port 57004 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:36:43.766412 sshd[1706]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:43.771169 systemd[1]: Started session-7.scope. May 17 00:36:43.771787 systemd-logind[1422]: New session 7 of user core. May 17 00:36:44.456918 sudo[1709]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:36:44.457222 sudo[1709]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:36:44.482579 dbus-daemon[1410]: Н|V\xf9U: received setenforce notice (enforcing=1697174992) May 17 00:36:44.484715 sudo[1709]: pam_unix(sudo:session): session closed for user root May 17 00:36:44.611215 sshd[1706]: pam_unix(sshd:session): session closed for user core May 17 00:36:44.614864 systemd[1]: sshd@4-10.200.4.17:22-10.200.16.10:57004.service: Deactivated successfully. May 17 00:36:44.615933 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:36:44.616745 systemd-logind[1422]: Session 7 logged out. Waiting for processes to exit. May 17 00:36:44.617727 systemd-logind[1422]: Removed session 7. May 17 00:36:44.710057 systemd[1]: Started sshd@5-10.200.4.17:22-10.200.16.10:57012.service. May 17 00:36:45.304319 sshd[1713]: Accepted publickey for core from 10.200.16.10 port 57012 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:36:45.305805 sshd[1713]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:45.310419 systemd[1]: Started session-8.scope. May 17 00:36:45.310992 systemd-logind[1422]: New session 8 of user core. May 17 00:36:45.631549 sudo[1717]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:36:45.631838 sudo[1717]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:36:45.634527 sudo[1717]: pam_unix(sudo:session): session closed for user root May 17 00:36:45.639003 sudo[1716]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:36:45.639280 sudo[1716]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:36:45.647844 systemd[1]: Stopping audit-rules.service... May 17 00:36:45.648000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:36:45.649654 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:36:45.656658 auditctl[1720]: No rules May 17 00:36:45.649792 systemd[1]: Stopped audit-rules.service. May 17 00:36:45.657407 kernel: audit: type=1305 audit(1747442205.648:219): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:36:45.656963 systemd[1]: Starting audit-rules.service... May 17 00:36:45.648000 audit[1720]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffed64f09f0 a2=420 a3=0 items=0 ppid=1 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:45.648000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:36:45.676017 kernel: audit: type=1300 audit(1747442205.648:219): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffed64f09f0 a2=420 a3=0 items=0 ppid=1 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:45.676087 kernel: audit: type=1327 audit(1747442205.648:219): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:36:45.676115 kernel: audit: type=1131 audit(1747442205.649:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:45.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:45.681445 augenrules[1737]: No rules May 17 00:36:45.682157 systemd[1]: Finished audit-rules.service. May 17 00:36:45.683137 sudo[1716]: pam_unix(sudo:session): session closed for user root May 17 00:36:45.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:45.694023 kernel: audit: type=1130 audit(1747442205.681:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:45.694077 kernel: audit: type=1106 audit(1747442205.681:222): pid=1716 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:45.681000 audit[1716]: USER_END pid=1716 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:45.681000 audit[1716]: CRED_DISP pid=1716 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:45.713459 kernel: audit: type=1104 audit(1747442205.681:223): pid=1716 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:45.787629 sshd[1713]: pam_unix(sshd:session): session closed for user core May 17 00:36:45.788000 audit[1713]: USER_END pid=1713 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:45.791002 systemd[1]: sshd@5-10.200.4.17:22-10.200.16.10:57012.service: Deactivated successfully. May 17 00:36:45.791833 systemd[1]: session-8.scope: Deactivated successfully. May 17 00:36:45.793469 systemd-logind[1422]: Session 8 logged out. Waiting for processes to exit. May 17 00:36:45.794379 systemd-logind[1422]: Removed session 8. May 17 00:36:45.788000 audit[1713]: CRED_DISP pid=1713 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:45.821696 kernel: audit: type=1106 audit(1747442205.788:224): pid=1713 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:45.821775 kernel: audit: type=1104 audit(1747442205.788:225): pid=1713 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:45.821799 kernel: audit: type=1131 audit(1747442205.788:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.17:22-10.200.16.10:57012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:45.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.17:22-10.200.16.10:57012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:45.886408 systemd[1]: Started sshd@6-10.200.4.17:22-10.200.16.10:57018.service. May 17 00:36:45.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.17:22-10.200.16.10:57018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:46.487000 audit[1743]: USER_ACCT pid=1743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:46.487987 sshd[1743]: Accepted publickey for core from 10.200.16.10 port 57018 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:36:46.488000 audit[1743]: CRED_ACQ pid=1743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:46.488000 audit[1743]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6cdff2b0 a2=3 a3=0 items=0 ppid=1 pid=1743 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:46.488000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:36:46.489398 sshd[1743]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:36:46.494753 systemd[1]: Started session-9.scope. May 17 00:36:46.495409 systemd-logind[1422]: New session 9 of user core. May 17 00:36:46.500000 audit[1743]: USER_START pid=1743 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:46.501000 audit[1747]: CRED_ACQ pid=1747 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:36:46.816000 audit[1748]: USER_ACCT pid=1748 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:46.816000 audit[1748]: CRED_REFR pid=1748 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:46.816989 sudo[1748]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:36:46.817386 sudo[1748]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:36:46.819000 audit[1748]: USER_START pid=1748 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:36:46.856693 systemd[1]: Starting docker.service... May 17 00:36:46.890094 env[1758]: time="2025-05-17T00:36:46.890034585Z" level=info msg="Starting up" May 17 00:36:46.892071 env[1758]: time="2025-05-17T00:36:46.892035204Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:36:46.892071 env[1758]: time="2025-05-17T00:36:46.892061805Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:36:46.892233 env[1758]: time="2025-05-17T00:36:46.892096505Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:36:46.892233 env[1758]: time="2025-05-17T00:36:46.892115705Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:36:46.895450 env[1758]: time="2025-05-17T00:36:46.895424536Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:36:46.895547 env[1758]: time="2025-05-17T00:36:46.895535237Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:36:46.895608 env[1758]: time="2025-05-17T00:36:46.895598238Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:36:46.895651 env[1758]: time="2025-05-17T00:36:46.895644038Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:36:46.903535 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3264491373-merged.mount: Deactivated successfully. May 17 00:36:46.959643 env[1758]: time="2025-05-17T00:36:46.959597040Z" level=info msg="Loading containers: start." May 17 00:36:47.017000 audit[1786]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.017000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffdf64f9ab0 a2=0 a3=7ffdf64f9a9c items=0 ppid=1758 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.017000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 17 00:36:47.019000 audit[1788]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.019000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe96cfc810 a2=0 a3=7ffe96cfc7fc items=0 ppid=1758 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.019000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 17 00:36:47.021000 audit[1790]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.021000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff6daafff0 a2=0 a3=7fff6daaffdc items=0 ppid=1758 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.021000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:36:47.023000 audit[1792]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.023000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffec471d4c0 a2=0 a3=7ffec471d4ac items=0 ppid=1758 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.023000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:36:47.025000 audit[1794]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.025000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff058e6be0 a2=0 a3=7fff058e6bcc items=0 ppid=1758 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.025000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 17 00:36:47.026000 audit[1796]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.026000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd2615a210 a2=0 a3=7ffd2615a1fc items=0 ppid=1758 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.026000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 17 00:36:47.043000 audit[1798]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.043000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd68f60f70 a2=0 a3=7ffd68f60f5c items=0 ppid=1758 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.043000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 17 00:36:47.045000 audit[1800]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.045000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff3a84f6c0 a2=0 a3=7fff3a84f6ac items=0 ppid=1758 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.045000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 17 00:36:47.047000 audit[1802]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1802 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.047000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe9e96c0e0 a2=0 a3=7ffe9e96c0cc items=0 ppid=1758 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.047000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:36:47.065000 audit[1806]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1806 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.065000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc29110890 a2=0 a3=7ffc2911087c items=0 ppid=1758 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.065000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:36:47.070000 audit[1807]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.070000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff601bda60 a2=0 a3=7fff601bda4c items=0 ppid=1758 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.070000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:36:47.116377 kernel: Initializing XFRM netlink socket May 17 00:36:47.154621 env[1758]: time="2025-05-17T00:36:47.154570184Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 17 00:36:47.244000 audit[1815]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1815 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.244000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc1e4558b0 a2=0 a3=7ffc1e45589c items=0 ppid=1758 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.244000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 17 00:36:47.293000 audit[1818]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1818 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.293000 audit[1818]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd6bf07890 a2=0 a3=7ffd6bf0787c items=0 ppid=1758 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.293000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 17 00:36:47.297000 audit[1821]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1821 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.297000 audit[1821]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc5e50a3e0 a2=0 a3=7ffc5e50a3cc items=0 ppid=1758 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.297000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 17 00:36:47.299000 audit[1823]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.299000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffea7dbc40 a2=0 a3=7fffea7dbc2c items=0 ppid=1758 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.299000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 17 00:36:47.301000 audit[1825]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1825 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.301000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd3bd584e0 a2=0 a3=7ffd3bd584cc items=0 ppid=1758 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.301000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 17 00:36:47.304000 audit[1827]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1827 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.304000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff0ae9c0b0 a2=0 a3=7fff0ae9c09c items=0 ppid=1758 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.304000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 17 00:36:47.306000 audit[1829]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.306000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd03e0eb70 a2=0 a3=7ffd03e0eb5c items=0 ppid=1758 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.306000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 17 00:36:47.308000 audit[1831]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1831 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.308000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd3d49ff10 a2=0 a3=7ffd3d49fefc items=0 ppid=1758 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.308000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 17 00:36:47.310000 audit[1833]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1833 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.310000 audit[1833]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe667689c0 a2=0 a3=7ffe667689ac items=0 ppid=1758 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.310000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:36:47.312000 audit[1835]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1835 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.312000 audit[1835]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc525081c0 a2=0 a3=7ffc525081ac items=0 ppid=1758 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.312000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:36:47.316000 audit[1837]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1837 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.316000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffccb22c570 a2=0 a3=7ffccb22c55c items=0 ppid=1758 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.316000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 17 00:36:47.317764 systemd-networkd[1588]: docker0: Link UP May 17 00:36:47.336000 audit[1841]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1841 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.336000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdc3c08570 a2=0 a3=7ffdc3c0855c items=0 ppid=1758 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.336000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:36:47.341000 audit[1842]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1842 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:36:47.341000 audit[1842]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffeff489f70 a2=0 a3=7ffeff489f5c items=0 ppid=1758 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:47.341000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:36:47.342702 env[1758]: time="2025-05-17T00:36:47.342670044Z" level=info msg="Loading containers: done." May 17 00:36:47.354954 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1454602619-merged.mount: Deactivated successfully. May 17 00:36:47.379836 env[1758]: time="2025-05-17T00:36:47.379796971Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 17 00:36:47.380095 env[1758]: time="2025-05-17T00:36:47.380039973Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 17 00:36:47.380185 env[1758]: time="2025-05-17T00:36:47.380165074Z" level=info msg="Daemon has completed initialization" May 17 00:36:47.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:47.445054 systemd[1]: Started docker.service. May 17 00:36:47.453617 env[1758]: time="2025-05-17T00:36:47.453564522Z" level=info msg="API listen on /run/docker.sock" May 17 00:36:49.830846 env[1439]: time="2025-05-17T00:36:49.830782956Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.5\"" May 17 00:36:50.635489 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4145530478.mount: Deactivated successfully. May 17 00:36:51.613902 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 17 00:36:51.614141 systemd[1]: Stopped kubelet.service. May 17 00:36:51.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:51.618023 kernel: kauditd_printk_skb: 84 callbacks suppressed May 17 00:36:51.618104 kernel: audit: type=1130 audit(1747442211.613:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:51.627308 systemd[1]: Starting kubelet.service... May 17 00:36:51.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:51.641361 kernel: audit: type=1131 audit(1747442211.613:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:51.759784 systemd[1]: Started kubelet.service. May 17 00:36:51.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:51.770359 kernel: audit: type=1130 audit(1747442211.759:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:36:51.825499 kubelet[1880]: E0517 00:36:51.825456 1880 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:36:51.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:36:51.827959 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:36:51.828123 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:36:51.838426 kernel: audit: type=1131 audit(1747442211.828:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:36:52.488840 env[1439]: time="2025-05-17T00:36:52.488777679Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:52.497240 env[1439]: time="2025-05-17T00:36:52.497143133Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:495c5ce47cf7c8b58655ef50d0f0a9b43c5ae18492059dc9af4c9aacae82a5a4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:52.501975 env[1439]: time="2025-05-17T00:36:52.501895363Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:52.506490 env[1439]: time="2025-05-17T00:36:52.506457592Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:0bee1bf751fe06009678c0cde7545443ba3a8d2edf71cea4c69cbb5774b9bf47,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:52.507116 env[1439]: time="2025-05-17T00:36:52.507086996Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.5\" returns image reference \"sha256:495c5ce47cf7c8b58655ef50d0f0a9b43c5ae18492059dc9af4c9aacae82a5a4\"" May 17 00:36:52.507747 env[1439]: time="2025-05-17T00:36:52.507722300Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.5\"" May 17 00:36:54.248595 env[1439]: time="2025-05-17T00:36:54.248536232Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:54.255200 env[1439]: time="2025-05-17T00:36:54.255152869Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:85dcaf69f000132c34fa34452e0fd8444bdf360b593fe06b1103680f6ecc7e00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:54.260527 env[1439]: time="2025-05-17T00:36:54.260430598Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:54.265708 env[1439]: time="2025-05-17T00:36:54.265670428Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:79bcf2f5e614c336c02dcea9dfcdf485d7297aed6a21239a99c87f7164f9baca,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:54.266431 env[1439]: time="2025-05-17T00:36:54.266397732Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.5\" returns image reference \"sha256:85dcaf69f000132c34fa34452e0fd8444bdf360b593fe06b1103680f6ecc7e00\"" May 17 00:36:54.267144 env[1439]: time="2025-05-17T00:36:54.267117936Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.5\"" May 17 00:36:55.666783 env[1439]: time="2025-05-17T00:36:55.666726861Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:55.672500 env[1439]: time="2025-05-17T00:36:55.672462392Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2729fb488407e634105c62238a45a599db1692680526e20844060a7a8197b45a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:55.677225 env[1439]: time="2025-05-17T00:36:55.677187616Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:55.680925 env[1439]: time="2025-05-17T00:36:55.680895536Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:f0f39d8b9808c407cacb3a46a5a9ce4d4a4a7cf3b674ba4bd221f5bc90051d2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:55.681611 env[1439]: time="2025-05-17T00:36:55.681579840Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.5\" returns image reference \"sha256:2729fb488407e634105c62238a45a599db1692680526e20844060a7a8197b45a\"" May 17 00:36:55.682263 env[1439]: time="2025-05-17T00:36:55.682238743Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.5\"" May 17 00:36:56.473779 kernel: hv_balloon: Max. dynamic memory size: 8192 MB May 17 00:36:57.077395 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3587677564.mount: Deactivated successfully. May 17 00:36:57.735015 env[1439]: time="2025-05-17T00:36:57.734896556Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:57.743049 env[1439]: time="2025-05-17T00:36:57.743000594Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:57.748109 env[1439]: time="2025-05-17T00:36:57.748018717Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:57.754013 env[1439]: time="2025-05-17T00:36:57.753982744Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9dc6553459c3319525ba4090a780db1a133d5dee68c08e07f9b9d6ba83b42a0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:57.755014 env[1439]: time="2025-05-17T00:36:57.754981149Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.5\" returns image reference \"sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363\"" May 17 00:36:57.755616 env[1439]: time="2025-05-17T00:36:57.755591752Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 17 00:36:58.401240 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount539266930.mount: Deactivated successfully. May 17 00:36:59.746288 env[1439]: time="2025-05-17T00:36:59.746223656Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:59.752921 env[1439]: time="2025-05-17T00:36:59.752878783Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:59.757052 env[1439]: time="2025-05-17T00:36:59.757013199Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:59.761638 env[1439]: time="2025-05-17T00:36:59.761610618Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:59.762269 env[1439]: time="2025-05-17T00:36:59.762240221Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" May 17 00:36:59.762973 env[1439]: time="2025-05-17T00:36:59.762946024Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 17 00:37:00.345929 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3110591575.mount: Deactivated successfully. May 17 00:37:00.367590 env[1439]: time="2025-05-17T00:37:00.367543091Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:00.374291 env[1439]: time="2025-05-17T00:37:00.374253017Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:00.378879 env[1439]: time="2025-05-17T00:37:00.378844334Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:00.383225 env[1439]: time="2025-05-17T00:37:00.383196151Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:00.383645 env[1439]: time="2025-05-17T00:37:00.383615252Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 17 00:37:00.384309 env[1439]: time="2025-05-17T00:37:00.384282555Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 17 00:37:01.035363 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount333041265.mount: Deactivated successfully. May 17 00:37:01.863807 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 17 00:37:01.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:01.864055 systemd[1]: Stopped kubelet.service. May 17 00:37:01.865485 systemd[1]: Starting kubelet.service... May 17 00:37:01.882390 kernel: audit: type=1130 audit(1747442221.863:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:01.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:01.895364 kernel: audit: type=1131 audit(1747442221.863:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:01.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:01.967952 systemd[1]: Started kubelet.service. May 17 00:37:01.980377 kernel: audit: type=1130 audit(1747442221.968:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:02.808195 kubelet[1890]: E0517 00:37:02.808143 1890 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:37:02.809796 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:37:02.809957 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:37:02.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:37:02.822367 kernel: audit: type=1131 audit(1747442222.809:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:37:03.384446 update_engine[1425]: I0517 00:37:03.384398 1425 update_attempter.cc:509] Updating boot flags... May 17 00:37:04.535453 env[1439]: time="2025-05-17T00:37:04.535404146Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:04.543836 env[1439]: time="2025-05-17T00:37:04.543794770Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:04.547734 env[1439]: time="2025-05-17T00:37:04.547656182Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:04.554140 env[1439]: time="2025-05-17T00:37:04.554107601Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:04.554837 env[1439]: time="2025-05-17T00:37:04.554803503Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" May 17 00:37:06.985997 systemd[1]: Stopped kubelet.service. May 17 00:37:06.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:06.999365 kernel: audit: type=1130 audit(1747442226.986:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:06.999625 systemd[1]: Starting kubelet.service... May 17 00:37:06.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:07.018370 kernel: audit: type=1131 audit(1747442226.986:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:07.048015 systemd[1]: Reloading. May 17 00:37:07.168950 /usr/lib/systemd/system-generators/torcx-generator[2007]: time="2025-05-17T00:37:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:37:07.168987 /usr/lib/systemd/system-generators/torcx-generator[2007]: time="2025-05-17T00:37:07Z" level=info msg="torcx already run" May 17 00:37:07.254013 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:37:07.254033 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:37:07.270769 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:37:07.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.365843 kernel: audit: type=1400 audit(1747442227.340:271): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.365941 kernel: audit: type=1400 audit(1747442227.340:272): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.365968 kernel: audit: type=1400 audit(1747442227.340:273): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.390166 kernel: audit: type=1400 audit(1747442227.340:274): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.390293 kernel: audit: type=1400 audit(1747442227.340:275): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.414388 kernel: audit: type=1400 audit(1747442227.340:276): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.414428 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:37:07.430606 kernel: audit: type=1400 audit(1747442227.340:277): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.353000 audit: BPF prog-id=47 op=LOAD May 17 00:37:07.353000 audit: BPF prog-id=46 op=UNLOAD May 17 00:37:07.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.377000 audit: BPF prog-id=48 op=LOAD May 17 00:37:07.377000 audit: BPF prog-id=40 op=UNLOAD May 17 00:37:07.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.401000 audit: BPF prog-id=49 op=LOAD May 17 00:37:07.401000 audit: BPF prog-id=41 op=UNLOAD May 17 00:37:07.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.401000 audit: BPF prog-id=50 op=LOAD May 17 00:37:07.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.401000 audit: BPF prog-id=51 op=LOAD May 17 00:37:07.401000 audit: BPF prog-id=42 op=UNLOAD May 17 00:37:07.401000 audit: BPF prog-id=43 op=UNLOAD May 17 00:37:07.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.413000 audit: BPF prog-id=52 op=LOAD May 17 00:37:07.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.431000 audit: BPF prog-id=54 op=LOAD May 17 00:37:07.431000 audit: BPF prog-id=33 op=UNLOAD May 17 00:37:07.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.431000 audit: BPF prog-id=57 op=LOAD May 17 00:37:07.431000 audit: BPF prog-id=44 op=UNLOAD May 17 00:37:07.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.433000 audit: BPF prog-id=58 op=LOAD May 17 00:37:07.433000 audit: BPF prog-id=36 op=UNLOAD May 17 00:37:07.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.434000 audit: BPF prog-id=59 op=LOAD May 17 00:37:07.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.434000 audit: BPF prog-id=60 op=LOAD May 17 00:37:07.434000 audit: BPF prog-id=37 op=UNLOAD May 17 00:37:07.434000 audit: BPF prog-id=38 op=UNLOAD May 17 00:37:07.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:07.435000 audit: BPF prog-id=61 op=LOAD May 17 00:37:07.435000 audit: BPF prog-id=39 op=UNLOAD May 17 00:37:07.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:07.453922 systemd[1]: Started kubelet.service. May 17 00:37:07.456965 systemd[1]: Stopping kubelet.service... May 17 00:37:07.457489 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:37:07.457673 systemd[1]: Stopped kubelet.service. May 17 00:37:07.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:07.459330 systemd[1]: Starting kubelet.service... May 17 00:37:07.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:07.741693 systemd[1]: Started kubelet.service. May 17 00:37:08.497450 kubelet[2076]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:37:08.497450 kubelet[2076]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:37:08.497450 kubelet[2076]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:37:08.502315 kubelet[2076]: I0517 00:37:08.497533 2076 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:37:08.900793 kubelet[2076]: I0517 00:37:08.900748 2076 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" May 17 00:37:08.900793 kubelet[2076]: I0517 00:37:08.900780 2076 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:37:08.901162 kubelet[2076]: I0517 00:37:08.901138 2076 server.go:954] "Client rotation is on, will bootstrap in background" May 17 00:37:08.924433 kubelet[2076]: E0517 00:37:08.924399 2076 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.200.4.17:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.200.4.17:6443: connect: connection refused" logger="UnhandledError" May 17 00:37:08.925560 kubelet[2076]: I0517 00:37:08.925528 2076 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:37:08.935268 kubelet[2076]: E0517 00:37:08.935232 2076 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:37:08.935411 kubelet[2076]: I0517 00:37:08.935376 2076 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:37:08.938297 kubelet[2076]: I0517 00:37:08.938274 2076 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:37:08.939708 kubelet[2076]: I0517 00:37:08.939665 2076 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:37:08.939901 kubelet[2076]: I0517 00:37:08.939705 2076 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-191fd4fe6d","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:37:08.940046 kubelet[2076]: I0517 00:37:08.939911 2076 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:37:08.940046 kubelet[2076]: I0517 00:37:08.939925 2076 container_manager_linux.go:304] "Creating device plugin manager" May 17 00:37:08.940141 kubelet[2076]: I0517 00:37:08.940070 2076 state_mem.go:36] "Initialized new in-memory state store" May 17 00:37:08.943524 kubelet[2076]: I0517 00:37:08.943503 2076 kubelet.go:446] "Attempting to sync node with API server" May 17 00:37:08.950427 kubelet[2076]: I0517 00:37:08.950403 2076 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:37:08.950901 kubelet[2076]: I0517 00:37:08.950885 2076 kubelet.go:352] "Adding apiserver pod source" May 17 00:37:08.950965 kubelet[2076]: I0517 00:37:08.950910 2076 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:37:08.961506 kubelet[2076]: W0517 00:37:08.961481 2076 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.4.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-191fd4fe6d&limit=500&resourceVersion=0": dial tcp 10.200.4.17:6443: connect: connection refused May 17 00:37:08.961664 kubelet[2076]: E0517 00:37:08.961629 2076 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.4.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-191fd4fe6d&limit=500&resourceVersion=0\": dial tcp 10.200.4.17:6443: connect: connection refused" logger="UnhandledError" May 17 00:37:08.961747 kubelet[2076]: I0517 00:37:08.961726 2076 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:37:08.962362 kubelet[2076]: I0517 00:37:08.962246 2076 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:37:08.964888 kubelet[2076]: W0517 00:37:08.964854 2076 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:37:08.973854 kubelet[2076]: I0517 00:37:08.973828 2076 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:37:08.973939 kubelet[2076]: I0517 00:37:08.973872 2076 server.go:1287] "Started kubelet" May 17 00:37:08.979617 kubelet[2076]: W0517 00:37:08.979567 2076 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.4.17:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.4.17:6443: connect: connection refused May 17 00:37:08.979704 kubelet[2076]: E0517 00:37:08.979621 2076 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.4.17:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.4.17:6443: connect: connection refused" logger="UnhandledError" May 17 00:37:08.980798 kubelet[2076]: I0517 00:37:08.979762 2076 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:37:08.981000 audit[2076]: AVC avc: denied { mac_admin } for pid=2076 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.981000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:37:08.981000 audit[2076]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000aac4b0 a1=c000989668 a2=c000aac480 a3=25 items=0 ppid=1 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.981000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:37:08.982783 kubelet[2076]: I0517 00:37:08.982746 2076 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:37:08.982000 audit[2076]: AVC avc: denied { mac_admin } for pid=2076 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:08.982000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:37:08.982000 audit[2076]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000953dc0 a1=c000989680 a2=c000aac540 a3=25 items=0 ppid=1 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.982000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:37:08.983158 kubelet[2076]: I0517 00:37:08.983139 2076 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:37:08.983317 kubelet[2076]: I0517 00:37:08.983293 2076 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:37:08.983978 kubelet[2076]: I0517 00:37:08.983925 2076 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:37:08.984258 kubelet[2076]: I0517 00:37:08.984237 2076 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:37:08.987000 audit[2091]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2091 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.987000 audit[2091]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffea63c2300 a2=0 a3=7ffea63c22ec items=0 ppid=2076 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.987000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:37:08.988603 kubelet[2076]: E0517 00:37:08.986748 2076 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.4.17:6443/api/v1/namespaces/default/events\": dial tcp 10.200.4.17:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.7-n-191fd4fe6d.18402972eb80cf8d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-191fd4fe6d,UID:ci-3510.3.7-n-191fd4fe6d,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-191fd4fe6d,},FirstTimestamp:2025-05-17 00:37:08.973850509 +0000 UTC m=+1.227120931,LastTimestamp:2025-05-17 00:37:08.973850509 +0000 UTC m=+1.227120931,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-191fd4fe6d,}" May 17 00:37:08.988000 audit[2092]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2092 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.988000 audit[2092]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe057d63f0 a2=0 a3=7ffe057d63dc items=0 ppid=2076 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.988000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:37:08.990300 kubelet[2076]: I0517 00:37:08.990279 2076 server.go:479] "Adding debug handlers to kubelet server" May 17 00:37:08.991267 kubelet[2076]: I0517 00:37:08.991251 2076 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:37:08.991525 kubelet[2076]: I0517 00:37:08.991498 2076 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:37:08.992274 kubelet[2076]: E0517 00:37:08.992253 2076 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-191fd4fe6d\" not found" May 17 00:37:08.993000 audit[2094]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2094 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.993000 audit[2094]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd4484fad0 a2=0 a3=7ffd4484fabc items=0 ppid=2076 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.993000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:37:08.994800 kubelet[2076]: E0517 00:37:08.994756 2076 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-191fd4fe6d?timeout=10s\": dial tcp 10.200.4.17:6443: connect: connection refused" interval="200ms" May 17 00:37:08.994976 kubelet[2076]: I0517 00:37:08.994953 2076 factory.go:221] Registration of the systemd container factory successfully May 17 00:37:08.995048 kubelet[2076]: I0517 00:37:08.995034 2076 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:37:08.996388 kubelet[2076]: I0517 00:37:08.996373 2076 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:37:08.996538 kubelet[2076]: I0517 00:37:08.996528 2076 reconciler.go:26] "Reconciler: start to sync state" May 17 00:37:08.996632 kubelet[2076]: I0517 00:37:08.996572 2076 factory.go:221] Registration of the containerd container factory successfully May 17 00:37:08.998000 audit[2096]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2096 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:08.998000 audit[2096]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffde5c68280 a2=0 a3=7ffde5c6826c items=0 ppid=2076 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:08.998000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:37:09.001367 kubelet[2076]: W0517 00:37:09.001302 2076 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.4.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.4.17:6443: connect: connection refused May 17 00:37:09.001452 kubelet[2076]: E0517 00:37:09.001384 2076 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.4.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.4.17:6443: connect: connection refused" logger="UnhandledError" May 17 00:37:09.002021 kubelet[2076]: E0517 00:37:08.996668 2076 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:37:09.043065 kubelet[2076]: I0517 00:37:09.043047 2076 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:37:09.043228 kubelet[2076]: I0517 00:37:09.043217 2076 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:37:09.043306 kubelet[2076]: I0517 00:37:09.043299 2076 state_mem.go:36] "Initialized new in-memory state store" May 17 00:37:09.053918 kubelet[2076]: I0517 00:37:09.053836 2076 policy_none.go:49] "None policy: Start" May 17 00:37:09.053918 kubelet[2076]: I0517 00:37:09.053894 2076 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:37:09.054269 kubelet[2076]: I0517 00:37:09.053938 2076 state_mem.go:35] "Initializing new in-memory state store" May 17 00:37:09.064000 audit[2102]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2102 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:09.064000 audit[2102]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc1d73faa0 a2=0 a3=7ffc1d73fa8c items=0 ppid=2076 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:09.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:37:09.065623 kubelet[2076]: I0517 00:37:09.064900 2076 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:37:09.065145 systemd[1]: Created slice kubepods.slice. May 17 00:37:09.065000 audit[2103]: NETFILTER_CFG table=mangle:34 family=10 entries=2 op=nft_register_chain pid=2103 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:09.065000 audit[2103]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffc39edc10 a2=0 a3=7fffc39edbfc items=0 ppid=2076 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:09.065000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:37:09.066389 kubelet[2076]: I0517 00:37:09.066298 2076 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:37:09.066389 kubelet[2076]: I0517 00:37:09.066319 2076 status_manager.go:227] "Starting to sync pod status with apiserver" May 17 00:37:09.066389 kubelet[2076]: I0517 00:37:09.066369 2076 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:37:09.066389 kubelet[2076]: I0517 00:37:09.066380 2076 kubelet.go:2382] "Starting kubelet main sync loop" May 17 00:37:09.066549 kubelet[2076]: E0517 00:37:09.066431 2076 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:37:09.067000 audit[2104]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2104 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:09.067000 audit[2104]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff778ddc70 a2=0 a3=7fff778ddc5c items=0 ppid=2076 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:09.067000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:37:09.070000 audit[2105]: NETFILTER_CFG table=mangle:36 family=10 entries=1 op=nft_register_chain pid=2105 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:09.070000 audit[2105]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0d614510 a2=0 a3=7ffe0d6144fc items=0 ppid=2076 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:09.070000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:37:09.071000 audit[2106]: NETFILTER_CFG table=nat:37 family=10 entries=2 op=nft_register_chain pid=2106 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:09.071000 audit[2106]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc54115490 a2=0 a3=7ffc5411547c items=0 ppid=2076 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:09.071000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:37:09.072972 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:37:09.073000 audit[2107]: NETFILTER_CFG table=filter:38 family=10 entries=2 op=nft_register_chain pid=2107 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:09.073000 audit[2107]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe02280790 a2=0 a3=7ffe0228077c items=0 ppid=2076 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:09.073000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:37:09.077380 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:37:09.077000 audit[2108]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2108 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:09.077000 audit[2108]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9943e1d0 a2=0 a3=7fff9943e1bc items=0 ppid=2076 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:09.077000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:37:09.078403 kubelet[2076]: W0517 00:37:09.078324 2076 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.4.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.4.17:6443: connect: connection refused May 17 00:37:09.078490 kubelet[2076]: E0517 00:37:09.078421 2076 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.4.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.4.17:6443: connect: connection refused" logger="UnhandledError" May 17 00:37:09.079000 audit[2109]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:09.079000 audit[2109]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffffe74bc10 a2=0 a3=7ffffe74bbfc items=0 ppid=2076 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:09.079000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:37:09.083985 kubelet[2076]: I0517 00:37:09.083962 2076 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:37:09.083000 audit[2076]: AVC avc: denied { mac_admin } for pid=2076 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:09.083000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:37:09.083000 audit[2076]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000977920 a1=c000c64030 a2=c0009778f0 a3=25 items=0 ppid=1 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:09.083000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:37:09.084286 kubelet[2076]: I0517 00:37:09.084038 2076 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:37:09.084286 kubelet[2076]: I0517 00:37:09.084158 2076 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:37:09.084286 kubelet[2076]: I0517 00:37:09.084175 2076 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:37:09.084900 kubelet[2076]: I0517 00:37:09.084881 2076 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:37:09.086916 kubelet[2076]: E0517 00:37:09.086899 2076 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:37:09.087001 kubelet[2076]: E0517 00:37:09.086979 2076 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.7-n-191fd4fe6d\" not found" May 17 00:37:09.176873 systemd[1]: Created slice kubepods-burstable-pod89506914591b571827f70bae15285233.slice. May 17 00:37:09.187110 kubelet[2076]: E0517 00:37:09.186409 2076 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-191fd4fe6d\" not found" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:09.186835 systemd[1]: Created slice kubepods-burstable-podf1d7398225a62a76dde16cb902544a41.slice. May 17 00:37:09.188845 kubelet[2076]: I0517 00:37:09.188225 2076 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:09.188947 kubelet[2076]: E0517 00:37:09.188847 2076 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.4.17:6443/api/v1/nodes\": dial tcp 10.200.4.17:6443: connect: connection refused" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:09.189621 kubelet[2076]: E0517 00:37:09.189056 2076 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-191fd4fe6d\" not found" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:09.191749 systemd[1]: Created slice kubepods-burstable-podf3f39a837441a34a9a47cb0cdfdda2ee.slice. May 17 00:37:09.193542 kubelet[2076]: E0517 00:37:09.193520 2076 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-191fd4fe6d\" not found" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:09.196436 kubelet[2076]: E0517 00:37:09.196406 2076 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-191fd4fe6d?timeout=10s\": dial tcp 10.200.4.17:6443: connect: connection refused" interval="400ms" May 17 00:37:09.298588 kubelet[2076]: I0517 00:37:09.298539 2076 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/89506914591b571827f70bae15285233-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-191fd4fe6d\" (UID: \"89506914591b571827f70bae15285233\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:09.298798 kubelet[2076]: I0517 00:37:09.298672 2076 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/89506914591b571827f70bae15285233-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-191fd4fe6d\" (UID: \"89506914591b571827f70bae15285233\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:09.298798 kubelet[2076]: I0517 00:37:09.298712 2076 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f1d7398225a62a76dde16cb902544a41-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-191fd4fe6d\" (UID: \"f1d7398225a62a76dde16cb902544a41\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:09.298798 kubelet[2076]: I0517 00:37:09.298779 2076 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f1d7398225a62a76dde16cb902544a41-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-191fd4fe6d\" (UID: \"f1d7398225a62a76dde16cb902544a41\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:09.298990 kubelet[2076]: I0517 00:37:09.298835 2076 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/89506914591b571827f70bae15285233-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-191fd4fe6d\" (UID: \"89506914591b571827f70bae15285233\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:09.298990 kubelet[2076]: I0517 00:37:09.298874 2076 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/89506914591b571827f70bae15285233-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-191fd4fe6d\" (UID: \"89506914591b571827f70bae15285233\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:09.298990 kubelet[2076]: I0517 00:37:09.298936 2076 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f3f39a837441a34a9a47cb0cdfdda2ee-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-191fd4fe6d\" (UID: \"f3f39a837441a34a9a47cb0cdfdda2ee\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:09.299151 kubelet[2076]: I0517 00:37:09.298997 2076 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f1d7398225a62a76dde16cb902544a41-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-191fd4fe6d\" (UID: \"f1d7398225a62a76dde16cb902544a41\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:09.299151 kubelet[2076]: I0517 00:37:09.299028 2076 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/89506914591b571827f70bae15285233-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-191fd4fe6d\" (UID: \"89506914591b571827f70bae15285233\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:09.391438 kubelet[2076]: I0517 00:37:09.391396 2076 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:09.391832 kubelet[2076]: E0517 00:37:09.391799 2076 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.4.17:6443/api/v1/nodes\": dial tcp 10.200.4.17:6443: connect: connection refused" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:09.488247 env[1439]: time="2025-05-17T00:37:09.488103009Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-191fd4fe6d,Uid:89506914591b571827f70bae15285233,Namespace:kube-system,Attempt:0,}" May 17 00:37:09.490018 env[1439]: time="2025-05-17T00:37:09.489966513Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-191fd4fe6d,Uid:f1d7398225a62a76dde16cb902544a41,Namespace:kube-system,Attempt:0,}" May 17 00:37:09.494729 env[1439]: time="2025-05-17T00:37:09.494687823Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-191fd4fe6d,Uid:f3f39a837441a34a9a47cb0cdfdda2ee,Namespace:kube-system,Attempt:0,}" May 17 00:37:09.597310 kubelet[2076]: E0517 00:37:09.597257 2076 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-191fd4fe6d?timeout=10s\": dial tcp 10.200.4.17:6443: connect: connection refused" interval="800ms" May 17 00:37:09.794737 kubelet[2076]: I0517 00:37:09.794299 2076 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:09.794737 kubelet[2076]: E0517 00:37:09.794656 2076 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.4.17:6443/api/v1/nodes\": dial tcp 10.200.4.17:6443: connect: connection refused" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:09.940757 kubelet[2076]: W0517 00:37:09.940687 2076 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.4.17:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.4.17:6443: connect: connection refused May 17 00:37:09.940934 kubelet[2076]: E0517 00:37:09.940763 2076 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.4.17:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.4.17:6443: connect: connection refused" logger="UnhandledError" May 17 00:37:10.025821 kubelet[2076]: W0517 00:37:10.025778 2076 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.4.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.4.17:6443: connect: connection refused May 17 00:37:10.025975 kubelet[2076]: E0517 00:37:10.025830 2076 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.4.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.4.17:6443: connect: connection refused" logger="UnhandledError" May 17 00:37:10.098718 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1564128771.mount: Deactivated successfully. May 17 00:37:10.134245 env[1439]: time="2025-05-17T00:37:10.134193870Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:10.137151 env[1439]: time="2025-05-17T00:37:10.137108375Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:10.147938 env[1439]: time="2025-05-17T00:37:10.147906097Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:10.152541 env[1439]: time="2025-05-17T00:37:10.152508906Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:10.156997 env[1439]: time="2025-05-17T00:37:10.156961915Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:10.161500 env[1439]: time="2025-05-17T00:37:10.161463924Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:10.165763 env[1439]: time="2025-05-17T00:37:10.165727333Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:10.170038 env[1439]: time="2025-05-17T00:37:10.170006641Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:10.181642 env[1439]: time="2025-05-17T00:37:10.181609164Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:10.183995 env[1439]: time="2025-05-17T00:37:10.183963069Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:10.194968 env[1439]: time="2025-05-17T00:37:10.194933791Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:10.197759 kubelet[2076]: W0517 00:37:10.197654 2076 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.4.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-191fd4fe6d&limit=500&resourceVersion=0": dial tcp 10.200.4.17:6443: connect: connection refused May 17 00:37:10.197759 kubelet[2076]: E0517 00:37:10.197726 2076 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.4.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-191fd4fe6d&limit=500&resourceVersion=0\": dial tcp 10.200.4.17:6443: connect: connection refused" logger="UnhandledError" May 17 00:37:10.209707 env[1439]: time="2025-05-17T00:37:10.209671420Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:10.259626 env[1439]: time="2025-05-17T00:37:10.255054211Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:10.259626 env[1439]: time="2025-05-17T00:37:10.255096111Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:10.259626 env[1439]: time="2025-05-17T00:37:10.255111311Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:10.259626 env[1439]: time="2025-05-17T00:37:10.255235112Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/85d411fd3b8c95cd7f1d675078e4a102615da8f657f7f75b03013562994b1a6c pid=2118 runtime=io.containerd.runc.v2 May 17 00:37:10.277313 env[1439]: time="2025-05-17T00:37:10.277241956Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:10.277510 env[1439]: time="2025-05-17T00:37:10.277325156Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:10.277510 env[1439]: time="2025-05-17T00:37:10.277378256Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:10.277621 env[1439]: time="2025-05-17T00:37:10.277507956Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1e8534ee119b294d6646b4ea495245a38c24400419551db2cf9ed176170e5e39 pid=2138 runtime=io.containerd.runc.v2 May 17 00:37:10.290900 systemd[1]: Started cri-containerd-85d411fd3b8c95cd7f1d675078e4a102615da8f657f7f75b03013562994b1a6c.scope. May 17 00:37:10.297569 env[1439]: time="2025-05-17T00:37:10.295764893Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:10.297569 env[1439]: time="2025-05-17T00:37:10.295837193Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:10.297569 env[1439]: time="2025-05-17T00:37:10.295868093Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:10.297569 env[1439]: time="2025-05-17T00:37:10.296038693Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fbbc642738e2212c91685592b4d4f4fc5c2f4cb994b9ba03873fad79b3326212 pid=2168 runtime=io.containerd.runc.v2 May 17 00:37:10.317812 systemd[1]: Started cri-containerd-1e8534ee119b294d6646b4ea495245a38c24400419551db2cf9ed176170e5e39.scope. May 17 00:37:10.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.324000 audit: BPF prog-id=62 op=LOAD May 17 00:37:10.325000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.325000 audit[2137]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2118 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835643431316664336238633935636437663164363735303738653461 May 17 00:37:10.326000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.326000 audit[2137]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2118 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835643431316664336238633935636437663164363735303738653461 May 17 00:37:10.326000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.326000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.326000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.326000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.326000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.326000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.326000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.326000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.326000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.326000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.326000 audit: BPF prog-id=63 op=LOAD May 17 00:37:10.326000 audit[2137]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0002ac170 items=0 ppid=2118 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835643431316664336238633935636437663164363735303738653461 May 17 00:37:10.327000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.327000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.327000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.327000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.327000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.327000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.327000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.327000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.327000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.327000 audit: BPF prog-id=64 op=LOAD May 17 00:37:10.327000 audit[2137]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0002ac1b8 items=0 ppid=2118 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835643431316664336238633935636437663164363735303738653461 May 17 00:37:10.328000 audit: BPF prog-id=64 op=UNLOAD May 17 00:37:10.328000 audit: BPF prog-id=63 op=UNLOAD May 17 00:37:10.329000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.329000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.329000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.329000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.329000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.329000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.329000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.329000 audit[2137]: AVC avc: denied { perfmon } for pid=2137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.329000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.329000 audit[2137]: AVC avc: denied { bpf } for pid=2137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.329000 audit: BPF prog-id=65 op=LOAD May 17 00:37:10.329000 audit[2137]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0002ac5c8 items=0 ppid=2118 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835643431316664336238633935636437663164363735303738653461 May 17 00:37:10.335086 systemd[1]: Started cri-containerd-fbbc642738e2212c91685592b4d4f4fc5c2f4cb994b9ba03873fad79b3326212.scope. May 17 00:37:10.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit: BPF prog-id=66 op=LOAD May 17 00:37:10.344000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit[2152]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2138 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165383533346565313139623239346436363436623465613439353234 May 17 00:37:10.344000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit[2152]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2138 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165383533346565313139623239346436363436623465613439353234 May 17 00:37:10.344000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit: BPF prog-id=67 op=LOAD May 17 00:37:10.344000 audit[2152]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000374260 items=0 ppid=2138 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165383533346565313139623239346436363436623465613439353234 May 17 00:37:10.344000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.344000 audit: BPF prog-id=68 op=LOAD May 17 00:37:10.344000 audit[2152]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003742a8 items=0 ppid=2138 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165383533346565313139623239346436363436623465613439353234 May 17 00:37:10.345000 audit: BPF prog-id=68 op=UNLOAD May 17 00:37:10.345000 audit: BPF prog-id=67 op=UNLOAD May 17 00:37:10.345000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.345000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.345000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.345000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.345000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.345000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.345000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.345000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.345000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.345000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.345000 audit: BPF prog-id=69 op=LOAD May 17 00:37:10.345000 audit[2152]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003746b8 items=0 ppid=2138 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165383533346565313139623239346436363436623465613439353234 May 17 00:37:10.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.362000 audit: BPF prog-id=70 op=LOAD May 17 00:37:10.367000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2168 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662626336343237333865323231326339313638353539326234643466 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2168 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662626336343237333865323231326339313638353539326234643466 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit: BPF prog-id=71 op=LOAD May 17 00:37:10.367000 audit[2180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c6be0 items=0 ppid=2168 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662626336343237333865323231326339313638353539326234643466 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit: BPF prog-id=72 op=LOAD May 17 00:37:10.367000 audit[2180]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c6c28 items=0 ppid=2168 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662626336343237333865323231326339313638353539326234643466 May 17 00:37:10.367000 audit: BPF prog-id=72 op=UNLOAD May 17 00:37:10.367000 audit: BPF prog-id=71 op=UNLOAD May 17 00:37:10.367000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.367000 audit: BPF prog-id=73 op=LOAD May 17 00:37:10.367000 audit[2180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c7038 items=0 ppid=2168 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662626336343237333865323231326339313638353539326234643466 May 17 00:37:10.385591 env[1439]: time="2025-05-17T00:37:10.384222769Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-191fd4fe6d,Uid:89506914591b571827f70bae15285233,Namespace:kube-system,Attempt:0,} returns sandbox id \"1e8534ee119b294d6646b4ea495245a38c24400419551db2cf9ed176170e5e39\"" May 17 00:37:10.389411 env[1439]: time="2025-05-17T00:37:10.389373280Z" level=info msg="CreateContainer within sandbox \"1e8534ee119b294d6646b4ea495245a38c24400419551db2cf9ed176170e5e39\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 17 00:37:10.398148 kubelet[2076]: E0517 00:37:10.398108 2076 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-191fd4fe6d?timeout=10s\": dial tcp 10.200.4.17:6443: connect: connection refused" interval="1.6s" May 17 00:37:10.405675 kubelet[2076]: W0517 00:37:10.405606 2076 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.4.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.4.17:6443: connect: connection refused May 17 00:37:10.405777 kubelet[2076]: E0517 00:37:10.405691 2076 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.4.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.4.17:6443: connect: connection refused" logger="UnhandledError" May 17 00:37:10.407685 env[1439]: time="2025-05-17T00:37:10.407651716Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-191fd4fe6d,Uid:f1d7398225a62a76dde16cb902544a41,Namespace:kube-system,Attempt:0,} returns sandbox id \"85d411fd3b8c95cd7f1d675078e4a102615da8f657f7f75b03013562994b1a6c\"" May 17 00:37:10.410630 env[1439]: time="2025-05-17T00:37:10.410596822Z" level=info msg="CreateContainer within sandbox \"85d411fd3b8c95cd7f1d675078e4a102615da8f657f7f75b03013562994b1a6c\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 17 00:37:10.418393 env[1439]: time="2025-05-17T00:37:10.418365338Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-191fd4fe6d,Uid:f3f39a837441a34a9a47cb0cdfdda2ee,Namespace:kube-system,Attempt:0,} returns sandbox id \"fbbc642738e2212c91685592b4d4f4fc5c2f4cb994b9ba03873fad79b3326212\"" May 17 00:37:10.421775 env[1439]: time="2025-05-17T00:37:10.421742844Z" level=info msg="CreateContainer within sandbox \"fbbc642738e2212c91685592b4d4f4fc5c2f4cb994b9ba03873fad79b3326212\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 17 00:37:10.437035 env[1439]: time="2025-05-17T00:37:10.436991475Z" level=info msg="CreateContainer within sandbox \"1e8534ee119b294d6646b4ea495245a38c24400419551db2cf9ed176170e5e39\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"eff4b2d4f4e3410a7ffb210b2a41682ed47781eafb4c2c410a78ce2a0783a4cc\"" May 17 00:37:10.437722 env[1439]: time="2025-05-17T00:37:10.437693676Z" level=info msg="StartContainer for \"eff4b2d4f4e3410a7ffb210b2a41682ed47781eafb4c2c410a78ce2a0783a4cc\"" May 17 00:37:10.453939 systemd[1]: Started cri-containerd-eff4b2d4f4e3410a7ffb210b2a41682ed47781eafb4c2c410a78ce2a0783a4cc.scope. May 17 00:37:10.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.471000 audit: BPF prog-id=74 op=LOAD May 17 00:37:10.472000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2138 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566663462326434663465333431306137666662323130623261343136 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=2138 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566663462326434663465333431306137666662323130623261343136 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit: BPF prog-id=75 op=LOAD May 17 00:37:10.472000 audit[2247]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c00027bdc0 items=0 ppid=2138 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566663462326434663465333431306137666662323130623261343136 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit: BPF prog-id=76 op=LOAD May 17 00:37:10.472000 audit[2247]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c00027be08 items=0 ppid=2138 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566663462326434663465333431306137666662323130623261343136 May 17 00:37:10.472000 audit: BPF prog-id=76 op=UNLOAD May 17 00:37:10.472000 audit: BPF prog-id=75 op=UNLOAD May 17 00:37:10.472000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { perfmon } for pid=2247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit[2247]: AVC avc: denied { bpf } for pid=2247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.472000 audit: BPF prog-id=77 op=LOAD May 17 00:37:10.472000 audit[2247]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003da218 items=0 ppid=2138 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566663462326434663465333431306137666662323130623261343136 May 17 00:37:10.497490 env[1439]: time="2025-05-17T00:37:10.497448796Z" level=info msg="CreateContainer within sandbox \"fbbc642738e2212c91685592b4d4f4fc5c2f4cb994b9ba03873fad79b3326212\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"cdfe6bf61a682f3d23e866da1491aa0555242fd9187418d54696929ca13c5ac2\"" May 17 00:37:10.498269 env[1439]: time="2025-05-17T00:37:10.498234897Z" level=info msg="StartContainer for \"cdfe6bf61a682f3d23e866da1491aa0555242fd9187418d54696929ca13c5ac2\"" May 17 00:37:10.501603 env[1439]: time="2025-05-17T00:37:10.501571904Z" level=info msg="CreateContainer within sandbox \"85d411fd3b8c95cd7f1d675078e4a102615da8f657f7f75b03013562994b1a6c\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"82714a0d688a8500166b305707f6f47ec386b48fd8c0b9ee0da845b202906833\"" May 17 00:37:10.502199 env[1439]: time="2025-05-17T00:37:10.502174705Z" level=info msg="StartContainer for \"82714a0d688a8500166b305707f6f47ec386b48fd8c0b9ee0da845b202906833\"" May 17 00:37:10.512722 env[1439]: time="2025-05-17T00:37:10.512581926Z" level=info msg="StartContainer for \"eff4b2d4f4e3410a7ffb210b2a41682ed47781eafb4c2c410a78ce2a0783a4cc\" returns successfully" May 17 00:37:10.535727 systemd[1]: Started cri-containerd-cdfe6bf61a682f3d23e866da1491aa0555242fd9187418d54696929ca13c5ac2.scope. May 17 00:37:10.543411 systemd[1]: Started cri-containerd-82714a0d688a8500166b305707f6f47ec386b48fd8c0b9ee0da845b202906833.scope. May 17 00:37:10.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.561000 audit: BPF prog-id=78 op=LOAD May 17 00:37:10.562000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.562000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2168 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364666536626636316136383266336432336538363664613134393161 May 17 00:37:10.563000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.563000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2168 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364666536626636316136383266336432336538363664613134393161 May 17 00:37:10.563000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.563000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.563000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.563000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.563000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.563000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.563000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.563000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.563000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.563000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.563000 audit: BPF prog-id=79 op=LOAD May 17 00:37:10.563000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00032d580 items=0 ppid=2168 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364666536626636316136383266336432336538363664613134393161 May 17 00:37:10.564000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.564000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.564000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.564000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.564000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.564000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.564000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.564000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.564000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.564000 audit: BPF prog-id=80 op=LOAD May 17 00:37:10.564000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00032d5c8 items=0 ppid=2168 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364666536626636316136383266336432336538363664613134393161 May 17 00:37:10.565000 audit: BPF prog-id=80 op=UNLOAD May 17 00:37:10.565000 audit: BPF prog-id=79 op=UNLOAD May 17 00:37:10.565000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.565000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.565000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.565000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.565000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.565000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.565000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.565000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.565000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.565000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.565000 audit: BPF prog-id=81 op=LOAD May 17 00:37:10.565000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00032d9d8 items=0 ppid=2168 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364666536626636316136383266336432336538363664613134393161 May 17 00:37:10.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.581000 audit: BPF prog-id=82 op=LOAD May 17 00:37:10.582000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2118 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832373134613064363838613835303031363662333035373037663666 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=2118 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832373134613064363838613835303031363662333035373037663666 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit: BPF prog-id=83 op=LOAD May 17 00:37:10.582000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000024830 items=0 ppid=2118 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832373134613064363838613835303031363662333035373037663666 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit: BPF prog-id=84 op=LOAD May 17 00:37:10.582000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000024878 items=0 ppid=2118 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832373134613064363838613835303031363662333035373037663666 May 17 00:37:10.582000 audit: BPF prog-id=84 op=UNLOAD May 17 00:37:10.582000 audit: BPF prog-id=83 op=UNLOAD May 17 00:37:10.582000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:10.582000 audit: BPF prog-id=85 op=LOAD May 17 00:37:10.582000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000024c88 items=0 ppid=2118 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832373134613064363838613835303031363662333035373037663666 May 17 00:37:10.596431 kubelet[2076]: I0517 00:37:10.596395 2076 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:10.596817 kubelet[2076]: E0517 00:37:10.596791 2076 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.4.17:6443/api/v1/nodes\": dial tcp 10.200.4.17:6443: connect: connection refused" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:10.653814 env[1439]: time="2025-05-17T00:37:10.653774108Z" level=info msg="StartContainer for \"cdfe6bf61a682f3d23e866da1491aa0555242fd9187418d54696929ca13c5ac2\" returns successfully" May 17 00:37:10.695215 env[1439]: time="2025-05-17T00:37:10.695169191Z" level=info msg="StartContainer for \"82714a0d688a8500166b305707f6f47ec386b48fd8c0b9ee0da845b202906833\" returns successfully" May 17 00:37:11.077966 kubelet[2076]: E0517 00:37:11.077371 2076 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-191fd4fe6d\" not found" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:11.079856 kubelet[2076]: E0517 00:37:11.079713 2076 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-191fd4fe6d\" not found" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:11.082213 kubelet[2076]: E0517 00:37:11.082197 2076 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-191fd4fe6d\" not found" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:12.084631 kubelet[2076]: E0517 00:37:12.084598 2076 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-191fd4fe6d\" not found" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:12.085554 kubelet[2076]: E0517 00:37:12.085329 2076 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-191fd4fe6d\" not found" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:12.199586 kubelet[2076]: I0517 00:37:12.199556 2076 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:12.386000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:12.391787 kernel: kauditd_printk_skb: 631 callbacks suppressed May 17 00:37:12.391878 kernel: audit: type=1400 audit(1747442232.386:532): avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:12.386000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000daee40 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:37:12.433371 kernel: audit: type=1300 audit(1747442232.386:532): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000daee40 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:37:12.386000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:12.456361 kernel: audit: type=1327 audit(1747442232.386:532): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:12.410000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:12.495414 kernel: audit: type=1400 audit(1747442232.410:533): avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:12.495531 kernel: audit: type=1300 audit(1747442232.410:533): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0007e0460 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:37:12.410000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0007e0460 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:37:12.513393 kernel: audit: type=1327 audit(1747442232.410:533): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:12.410000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:12.905000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:12.923505 kernel: audit: type=1400 audit(1747442232.905:534): avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:12.905000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0076f6c30 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:37:12.961807 kernel: audit: type=1300 audit(1747442232.905:534): arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0076f6c30 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:37:12.961943 kernel: audit: type=1327 audit(1747442232.905:534): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:37:12.905000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:37:12.978320 kernel: audit: type=1400 audit(1747442232.905:535): avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:12.905000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:12.905000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0076f6c90 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:37:12.905000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:37:12.979000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:12.979000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c004b0c6a0 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:37:12.979000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:37:12.986000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:12.986000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c007640940 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:37:12.986000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:37:12.986000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:12.986000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c002c1af00 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:37:12.986000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:37:12.989000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:12.989000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c0076f73e0 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:37:12.989000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:37:14.069653 kubelet[2076]: E0517 00:37:14.069440 2076 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-191fd4fe6d\" not found" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:14.070086 kubelet[2076]: E0517 00:37:14.069983 2076 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{ci-3510.3.7-n-191fd4fe6d.18402972eb80cf8d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-191fd4fe6d,UID:ci-3510.3.7-n-191fd4fe6d,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-191fd4fe6d,},FirstTimestamp:2025-05-17 00:37:08.973850509 +0000 UTC m=+1.227120931,LastTimestamp:2025-05-17 00:37:08.973850509 +0000 UTC m=+1.227120931,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-191fd4fe6d,}" May 17 00:37:14.074392 kubelet[2076]: I0517 00:37:14.074363 2076 kubelet_node_status.go:78] "Successfully registered node" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:14.074498 kubelet[2076]: E0517 00:37:14.074396 2076 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"ci-3510.3.7-n-191fd4fe6d\": node \"ci-3510.3.7-n-191fd4fe6d\" not found" May 17 00:37:14.092975 kubelet[2076]: I0517 00:37:14.092945 2076 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:14.183198 kubelet[2076]: W0517 00:37:14.183153 2076 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:37:14.184858 kubelet[2076]: I0517 00:37:14.183551 2076 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:14.210213 kubelet[2076]: I0517 00:37:14.210178 2076 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:14.278974 kubelet[2076]: W0517 00:37:14.278934 2076 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:37:14.279162 kubelet[2076]: E0517 00:37:14.279000 2076 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510.3.7-n-191fd4fe6d\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:14.279468 kubelet[2076]: W0517 00:37:14.279442 2076 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:37:14.279584 kubelet[2076]: I0517 00:37:14.279554 2076 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:14.380498 kubelet[2076]: W0517 00:37:14.380459 2076 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:37:14.774796 kubelet[2076]: I0517 00:37:14.774692 2076 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:14.830335 kubelet[2076]: W0517 00:37:14.830302 2076 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:37:14.830633 kubelet[2076]: E0517 00:37:14.830606 2076 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ci-3510.3.7-n-191fd4fe6d\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:15.066471 kubelet[2076]: I0517 00:37:15.066328 2076 apiserver.go:52] "Watching apiserver" May 17 00:37:15.096750 kubelet[2076]: I0517 00:37:15.096715 2076 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:37:16.417223 systemd[1]: Reloading. May 17 00:37:16.510802 /usr/lib/systemd/system-generators/torcx-generator[2372]: time="2025-05-17T00:37:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:37:16.511272 /usr/lib/systemd/system-generators/torcx-generator[2372]: time="2025-05-17T00:37:16Z" level=info msg="torcx already run" May 17 00:37:16.598532 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:37:16.598551 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:37:16.615562 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:37:16.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.697000 audit: BPF prog-id=86 op=LOAD May 17 00:37:16.697000 audit: BPF prog-id=66 op=UNLOAD May 17 00:37:16.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.699000 audit: BPF prog-id=87 op=LOAD May 17 00:37:16.699000 audit: BPF prog-id=47 op=UNLOAD May 17 00:37:16.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.700000 audit: BPF prog-id=88 op=LOAD May 17 00:37:16.700000 audit: BPF prog-id=48 op=UNLOAD May 17 00:37:16.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.702000 audit: BPF prog-id=89 op=LOAD May 17 00:37:16.702000 audit: BPF prog-id=74 op=UNLOAD May 17 00:37:16.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.704000 audit: BPF prog-id=90 op=LOAD May 17 00:37:16.704000 audit: BPF prog-id=49 op=UNLOAD May 17 00:37:16.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.705000 audit: BPF prog-id=91 op=LOAD May 17 00:37:16.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.705000 audit: BPF prog-id=92 op=LOAD May 17 00:37:16.705000 audit: BPF prog-id=50 op=UNLOAD May 17 00:37:16.705000 audit: BPF prog-id=51 op=UNLOAD May 17 00:37:16.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.706000 audit: BPF prog-id=93 op=LOAD May 17 00:37:16.706000 audit: BPF prog-id=78 op=UNLOAD May 17 00:37:16.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.707000 audit: BPF prog-id=94 op=LOAD May 17 00:37:16.707000 audit: BPF prog-id=82 op=UNLOAD May 17 00:37:16.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.708000 audit: BPF prog-id=95 op=LOAD May 17 00:37:16.708000 audit: BPF prog-id=62 op=UNLOAD May 17 00:37:16.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.709000 audit: BPF prog-id=96 op=LOAD May 17 00:37:16.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.709000 audit: BPF prog-id=97 op=LOAD May 17 00:37:16.709000 audit: BPF prog-id=52 op=UNLOAD May 17 00:37:16.709000 audit: BPF prog-id=53 op=UNLOAD May 17 00:37:16.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.710000 audit: BPF prog-id=98 op=LOAD May 17 00:37:16.710000 audit: BPF prog-id=70 op=UNLOAD May 17 00:37:16.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit: BPF prog-id=99 op=LOAD May 17 00:37:16.711000 audit: BPF prog-id=54 op=UNLOAD May 17 00:37:16.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit: BPF prog-id=100 op=LOAD May 17 00:37:16.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.711000 audit: BPF prog-id=101 op=LOAD May 17 00:37:16.711000 audit: BPF prog-id=55 op=UNLOAD May 17 00:37:16.711000 audit: BPF prog-id=56 op=UNLOAD May 17 00:37:16.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.712000 audit: BPF prog-id=102 op=LOAD May 17 00:37:16.712000 audit: BPF prog-id=57 op=UNLOAD May 17 00:37:16.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit: BPF prog-id=103 op=LOAD May 17 00:37:16.714000 audit: BPF prog-id=58 op=UNLOAD May 17 00:37:16.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit: BPF prog-id=104 op=LOAD May 17 00:37:16.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.714000 audit: BPF prog-id=105 op=LOAD May 17 00:37:16.714000 audit: BPF prog-id=59 op=UNLOAD May 17 00:37:16.714000 audit: BPF prog-id=60 op=UNLOAD May 17 00:37:16.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.716000 audit: BPF prog-id=106 op=LOAD May 17 00:37:16.716000 audit: BPF prog-id=61 op=UNLOAD May 17 00:37:16.734621 systemd[1]: Stopping kubelet.service... May 17 00:37:16.759678 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:37:16.759895 systemd[1]: Stopped kubelet.service. May 17 00:37:16.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:16.761846 systemd[1]: Starting kubelet.service... May 17 00:37:16.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:16.891881 systemd[1]: Started kubelet.service. May 17 00:37:16.938361 kubelet[2441]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:37:16.938361 kubelet[2441]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:37:16.938361 kubelet[2441]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:37:16.938846 kubelet[2441]: I0517 00:37:16.938489 2441 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:37:16.945975 kubelet[2441]: I0517 00:37:16.945942 2441 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" May 17 00:37:16.945975 kubelet[2441]: I0517 00:37:16.945967 2441 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:37:16.946320 kubelet[2441]: I0517 00:37:16.946233 2441 server.go:954] "Client rotation is on, will bootstrap in background" May 17 00:37:16.947337 kubelet[2441]: I0517 00:37:16.947315 2441 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 17 00:37:16.950379 kubelet[2441]: I0517 00:37:16.949279 2441 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:37:16.955487 kubelet[2441]: E0517 00:37:16.955461 2441 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:37:16.955487 kubelet[2441]: I0517 00:37:16.955485 2441 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:37:16.958297 kubelet[2441]: I0517 00:37:16.958267 2441 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:37:16.958529 kubelet[2441]: I0517 00:37:16.958497 2441 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:37:16.958690 kubelet[2441]: I0517 00:37:16.958527 2441 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-191fd4fe6d","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:37:16.958829 kubelet[2441]: I0517 00:37:16.958700 2441 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:37:16.958829 kubelet[2441]: I0517 00:37:16.958714 2441 container_manager_linux.go:304] "Creating device plugin manager" May 17 00:37:16.958829 kubelet[2441]: I0517 00:37:16.958791 2441 state_mem.go:36] "Initialized new in-memory state store" May 17 00:37:16.959480 kubelet[2441]: I0517 00:37:16.959461 2441 kubelet.go:446] "Attempting to sync node with API server" May 17 00:37:16.959555 kubelet[2441]: I0517 00:37:16.959532 2441 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:37:16.959611 kubelet[2441]: I0517 00:37:16.959558 2441 kubelet.go:352] "Adding apiserver pod source" May 17 00:37:16.959611 kubelet[2441]: I0517 00:37:16.959575 2441 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:37:16.965869 kubelet[2441]: I0517 00:37:16.965848 2441 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:37:16.966510 kubelet[2441]: I0517 00:37:16.966495 2441 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:37:16.967155 kubelet[2441]: I0517 00:37:16.967141 2441 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:37:16.967294 kubelet[2441]: I0517 00:37:16.967286 2441 server.go:1287] "Started kubelet" May 17 00:37:16.969000 audit[2441]: AVC avc: denied { mac_admin } for pid=2441 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.969000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:37:16.969000 audit[2441]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00015c2a0 a1=c000c7a918 a2=c00015c270 a3=25 items=0 ppid=1 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:16.969000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:37:16.970157 kubelet[2441]: I0517 00:37:16.970137 2441 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:37:16.969000 audit[2441]: AVC avc: denied { mac_admin } for pid=2441 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:16.969000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:37:16.969000 audit[2441]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00093ef80 a1=c000c7a930 a2=c00015c390 a3=25 items=0 ppid=1 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:16.969000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:37:16.970565 kubelet[2441]: I0517 00:37:16.970550 2441 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:37:16.970656 kubelet[2441]: I0517 00:37:16.970647 2441 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:37:16.981387 kubelet[2441]: I0517 00:37:16.978581 2441 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:37:16.981387 kubelet[2441]: I0517 00:37:16.979641 2441 server.go:479] "Adding debug handlers to kubelet server" May 17 00:37:16.981387 kubelet[2441]: I0517 00:37:16.980714 2441 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:37:16.981387 kubelet[2441]: I0517 00:37:16.980912 2441 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:37:16.981387 kubelet[2441]: I0517 00:37:16.981111 2441 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:37:16.981804 kubelet[2441]: I0517 00:37:16.981786 2441 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:37:16.982017 kubelet[2441]: E0517 00:37:16.981995 2441 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-191fd4fe6d\" not found" May 17 00:37:16.986538 kubelet[2441]: I0517 00:37:16.986155 2441 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:37:16.986538 kubelet[2441]: I0517 00:37:16.986288 2441 reconciler.go:26] "Reconciler: start to sync state" May 17 00:37:16.988610 kubelet[2441]: I0517 00:37:16.988156 2441 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:37:16.989557 kubelet[2441]: I0517 00:37:16.989363 2441 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:37:16.989557 kubelet[2441]: I0517 00:37:16.989394 2441 status_manager.go:227] "Starting to sync pod status with apiserver" May 17 00:37:16.989557 kubelet[2441]: I0517 00:37:16.989419 2441 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:37:16.989557 kubelet[2441]: I0517 00:37:16.989427 2441 kubelet.go:2382] "Starting kubelet main sync loop" May 17 00:37:16.989557 kubelet[2441]: E0517 00:37:16.989476 2441 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:37:17.002355 kubelet[2441]: I0517 00:37:16.999580 2441 factory.go:221] Registration of the systemd container factory successfully May 17 00:37:17.002355 kubelet[2441]: I0517 00:37:16.999675 2441 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:37:17.002355 kubelet[2441]: I0517 00:37:17.001614 2441 factory.go:221] Registration of the containerd container factory successfully May 17 00:37:17.051762 kubelet[2441]: I0517 00:37:17.051739 2441 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:37:17.051930 kubelet[2441]: I0517 00:37:17.051920 2441 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:37:17.051983 kubelet[2441]: I0517 00:37:17.051978 2441 state_mem.go:36] "Initialized new in-memory state store" May 17 00:37:17.052149 kubelet[2441]: I0517 00:37:17.052138 2441 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 17 00:37:17.052218 kubelet[2441]: I0517 00:37:17.052202 2441 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 17 00:37:17.052265 kubelet[2441]: I0517 00:37:17.052260 2441 policy_none.go:49] "None policy: Start" May 17 00:37:17.052308 kubelet[2441]: I0517 00:37:17.052302 2441 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:37:17.052360 kubelet[2441]: I0517 00:37:17.052354 2441 state_mem.go:35] "Initializing new in-memory state store" May 17 00:37:17.052500 kubelet[2441]: I0517 00:37:17.052492 2441 state_mem.go:75] "Updated machine memory state" May 17 00:37:17.055686 kubelet[2441]: I0517 00:37:17.055668 2441 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:37:17.055000 audit[2441]: AVC avc: denied { mac_admin } for pid=2441 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:17.055000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:37:17.055000 audit[2441]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fff620 a1=c0009a9ce0 a2=c000fff5f0 a3=25 items=0 ppid=1 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:17.055000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:37:17.056064 kubelet[2441]: I0517 00:37:17.056049 2441 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:37:17.056224 kubelet[2441]: I0517 00:37:17.056213 2441 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:37:17.056299 kubelet[2441]: I0517 00:37:17.056277 2441 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:37:17.056862 kubelet[2441]: I0517 00:37:17.056844 2441 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:37:17.058287 kubelet[2441]: E0517 00:37:17.058269 2441 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:37:17.090308 kubelet[2441]: I0517 00:37:17.090272 2441 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:17.090633 kubelet[2441]: I0517 00:37:17.090618 2441 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:17.091010 kubelet[2441]: I0517 00:37:17.090983 2441 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:17.099053 kubelet[2441]: W0517 00:37:17.099027 2441 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:37:17.099164 kubelet[2441]: E0517 00:37:17.099104 2441 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510.3.7-n-191fd4fe6d\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:17.099665 kubelet[2441]: W0517 00:37:17.099634 2441 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:37:17.099812 kubelet[2441]: E0517 00:37:17.099686 2441 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510.3.7-n-191fd4fe6d\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:17.100006 kubelet[2441]: W0517 00:37:17.099989 2441 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:37:17.100117 kubelet[2441]: E0517 00:37:17.100095 2441 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ci-3510.3.7-n-191fd4fe6d\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:17.159626 kubelet[2441]: I0517 00:37:17.159599 2441 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:17.170581 kubelet[2441]: I0517 00:37:17.170553 2441 kubelet_node_status.go:124] "Node was previously registered" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:17.170713 kubelet[2441]: I0517 00:37:17.170627 2441 kubelet_node_status.go:78] "Successfully registered node" node="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:17.187385 kubelet[2441]: I0517 00:37:17.187354 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f1d7398225a62a76dde16cb902544a41-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-191fd4fe6d\" (UID: \"f1d7398225a62a76dde16cb902544a41\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:17.187578 kubelet[2441]: I0517 00:37:17.187556 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f1d7398225a62a76dde16cb902544a41-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-191fd4fe6d\" (UID: \"f1d7398225a62a76dde16cb902544a41\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:17.187661 kubelet[2441]: I0517 00:37:17.187588 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f1d7398225a62a76dde16cb902544a41-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-191fd4fe6d\" (UID: \"f1d7398225a62a76dde16cb902544a41\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:17.187661 kubelet[2441]: I0517 00:37:17.187612 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/89506914591b571827f70bae15285233-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-191fd4fe6d\" (UID: \"89506914591b571827f70bae15285233\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:17.187661 kubelet[2441]: I0517 00:37:17.187634 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/89506914591b571827f70bae15285233-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-191fd4fe6d\" (UID: \"89506914591b571827f70bae15285233\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:17.187790 kubelet[2441]: I0517 00:37:17.187658 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/89506914591b571827f70bae15285233-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-191fd4fe6d\" (UID: \"89506914591b571827f70bae15285233\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:17.187790 kubelet[2441]: I0517 00:37:17.187680 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/89506914591b571827f70bae15285233-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-191fd4fe6d\" (UID: \"89506914591b571827f70bae15285233\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:17.187790 kubelet[2441]: I0517 00:37:17.187704 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/89506914591b571827f70bae15285233-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-191fd4fe6d\" (UID: \"89506914591b571827f70bae15285233\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:17.187790 kubelet[2441]: I0517 00:37:17.187726 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f3f39a837441a34a9a47cb0cdfdda2ee-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-191fd4fe6d\" (UID: \"f3f39a837441a34a9a47cb0cdfdda2ee\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:17.960406 kubelet[2441]: I0517 00:37:17.960359 2441 apiserver.go:52] "Watching apiserver" May 17 00:37:17.986895 kubelet[2441]: I0517 00:37:17.986849 2441 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:37:18.033460 kubelet[2441]: I0517 00:37:18.031726 2441 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:18.033460 kubelet[2441]: I0517 00:37:18.032191 2441 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:18.050946 kubelet[2441]: W0517 00:37:18.050916 2441 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:37:18.059529 kubelet[2441]: E0517 00:37:18.059495 2441 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510.3.7-n-191fd4fe6d\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:18.059723 kubelet[2441]: W0517 00:37:18.051899 2441 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 17 00:37:18.059814 kubelet[2441]: E0517 00:37:18.059779 2441 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510.3.7-n-191fd4fe6d\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.7-n-191fd4fe6d" May 17 00:37:18.072415 kubelet[2441]: I0517 00:37:18.072358 2441 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.7-n-191fd4fe6d" podStartSLOduration=4.07232337 podStartE2EDuration="4.07232337s" podCreationTimestamp="2025-05-17 00:37:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:37:18.072043073 +0000 UTC m=+1.173835194" watchObservedRunningTime="2025-05-17 00:37:18.07232337 +0000 UTC m=+1.174115391" May 17 00:37:18.105568 kubelet[2441]: I0517 00:37:18.105503 2441 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.7-n-191fd4fe6d" podStartSLOduration=4.105481999 podStartE2EDuration="4.105481999s" podCreationTimestamp="2025-05-17 00:37:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:37:18.087927296 +0000 UTC m=+1.189719317" watchObservedRunningTime="2025-05-17 00:37:18.105481999 +0000 UTC m=+1.207274120" May 17 00:37:18.121975 kubelet[2441]: I0517 00:37:18.121911 2441 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-191fd4fe6d" podStartSLOduration=4.121892816 podStartE2EDuration="4.121892816s" podCreationTimestamp="2025-05-17 00:37:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:37:18.105830295 +0000 UTC m=+1.207622316" watchObservedRunningTime="2025-05-17 00:37:18.121892816 +0000 UTC m=+1.223684837" May 17 00:37:20.083000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:20.088366 kernel: kauditd_printk_skb: 272 callbacks suppressed May 17 00:37:20.088463 kernel: audit: type=1400 audit(1747442240.083:789): avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:20.083000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0003dd660 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:37:20.166492 kernel: audit: type=1300 audit(1747442240.083:789): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0003dd660 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:37:20.083000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:20.083000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:20.197568 kernel: audit: type=1327 audit(1747442240.083:789): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:20.197678 kernel: audit: type=1400 audit(1747442240.083:790): avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:20.197707 kernel: audit: type=1300 audit(1747442240.083:790): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0003dd860 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:37:20.083000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0003dd860 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:37:20.083000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:20.232436 kernel: audit: type=1327 audit(1747442240.083:790): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:20.239815 kernel: audit: type=1400 audit(1747442240.083:791): avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:20.083000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:20.083000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0003dda40 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:37:20.265827 kernel: audit: type=1300 audit(1747442240.083:791): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0003dda40 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:37:20.265939 kernel: audit: type=1327 audit(1747442240.083:791): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:20.083000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:20.083000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:20.296148 kernel: audit: type=1400 audit(1747442240.083:792): avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:20.083000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0007e16e0 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:37:20.083000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:21.782000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7404 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:37:21.782000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00015ed40 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:37:21.782000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:23.455070 kubelet[2441]: I0517 00:37:23.455021 2441 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 17 00:37:23.455675 env[1439]: time="2025-05-17T00:37:23.455631115Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:37:23.456027 kubelet[2441]: I0517 00:37:23.455861 2441 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 17 00:37:24.363935 systemd[1]: Created slice kubepods-besteffort-pod7c9865ec_209f_4caa_b2ec_6ad4c3fc3c00.slice. May 17 00:37:24.433974 kubelet[2441]: I0517 00:37:24.433933 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7c9865ec-209f-4caa-b2ec-6ad4c3fc3c00-lib-modules\") pod \"kube-proxy-7lr5q\" (UID: \"7c9865ec-209f-4caa-b2ec-6ad4c3fc3c00\") " pod="kube-system/kube-proxy-7lr5q" May 17 00:37:24.434272 kubelet[2441]: I0517 00:37:24.434245 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kfph9\" (UniqueName: \"kubernetes.io/projected/7c9865ec-209f-4caa-b2ec-6ad4c3fc3c00-kube-api-access-kfph9\") pod \"kube-proxy-7lr5q\" (UID: \"7c9865ec-209f-4caa-b2ec-6ad4c3fc3c00\") " pod="kube-system/kube-proxy-7lr5q" May 17 00:37:24.434468 kubelet[2441]: I0517 00:37:24.434451 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/7c9865ec-209f-4caa-b2ec-6ad4c3fc3c00-kube-proxy\") pod \"kube-proxy-7lr5q\" (UID: \"7c9865ec-209f-4caa-b2ec-6ad4c3fc3c00\") " pod="kube-system/kube-proxy-7lr5q" May 17 00:37:24.434652 kubelet[2441]: I0517 00:37:24.434626 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7c9865ec-209f-4caa-b2ec-6ad4c3fc3c00-xtables-lock\") pod \"kube-proxy-7lr5q\" (UID: \"7c9865ec-209f-4caa-b2ec-6ad4c3fc3c00\") " pod="kube-system/kube-proxy-7lr5q" May 17 00:37:24.491813 systemd[1]: Created slice kubepods-besteffort-pod743f3978_1e30_43be_bbac_7fc87d373fb3.slice. May 17 00:37:24.535575 kubelet[2441]: I0517 00:37:24.535532 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/743f3978-1e30-43be-bbac-7fc87d373fb3-var-lib-calico\") pod \"tigera-operator-844669ff44-62gkb\" (UID: \"743f3978-1e30-43be-bbac-7fc87d373fb3\") " pod="tigera-operator/tigera-operator-844669ff44-62gkb" May 17 00:37:24.536177 kubelet[2441]: I0517 00:37:24.536146 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r7nkh\" (UniqueName: \"kubernetes.io/projected/743f3978-1e30-43be-bbac-7fc87d373fb3-kube-api-access-r7nkh\") pod \"tigera-operator-844669ff44-62gkb\" (UID: \"743f3978-1e30-43be-bbac-7fc87d373fb3\") " pod="tigera-operator/tigera-operator-844669ff44-62gkb" May 17 00:37:24.541886 kubelet[2441]: I0517 00:37:24.541852 2441 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:37:24.673540 env[1439]: time="2025-05-17T00:37:24.673410631Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7lr5q,Uid:7c9865ec-209f-4caa-b2ec-6ad4c3fc3c00,Namespace:kube-system,Attempt:0,}" May 17 00:37:24.726276 env[1439]: time="2025-05-17T00:37:24.726207331Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:24.726484 env[1439]: time="2025-05-17T00:37:24.726245031Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:24.726484 env[1439]: time="2025-05-17T00:37:24.726271831Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:24.726627 env[1439]: time="2025-05-17T00:37:24.726479829Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a034a0571cabe8f372ef811f242bcffe4a997c7e89c06098cb1f94673df22b7e pid=2492 runtime=io.containerd.runc.v2 May 17 00:37:24.745735 systemd[1]: Started cri-containerd-a034a0571cabe8f372ef811f242bcffe4a997c7e89c06098cb1f94673df22b7e.scope. May 17 00:37:24.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.759000 audit: BPF prog-id=107 op=LOAD May 17 00:37:24.760000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2492 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:24.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333461303537316361626538663337326566383131663234326263 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2492 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:24.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333461303537316361626538663337326566383131663234326263 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit: BPF prog-id=108 op=LOAD May 17 00:37:24.760000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002d3eb0 items=0 ppid=2492 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:24.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333461303537316361626538663337326566383131663234326263 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit: BPF prog-id=109 op=LOAD May 17 00:37:24.760000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002d3ef8 items=0 ppid=2492 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:24.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333461303537316361626538663337326566383131663234326263 May 17 00:37:24.760000 audit: BPF prog-id=109 op=UNLOAD May 17 00:37:24.760000 audit: BPF prog-id=108 op=UNLOAD May 17 00:37:24.760000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.760000 audit: BPF prog-id=110 op=LOAD May 17 00:37:24.760000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00039c308 items=0 ppid=2492 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:24.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130333461303537316361626538663337326566383131663234326263 May 17 00:37:24.773156 env[1439]: time="2025-05-17T00:37:24.772687391Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7lr5q,Uid:7c9865ec-209f-4caa-b2ec-6ad4c3fc3c00,Namespace:kube-system,Attempt:0,} returns sandbox id \"a034a0571cabe8f372ef811f242bcffe4a997c7e89c06098cb1f94673df22b7e\"" May 17 00:37:24.776163 env[1439]: time="2025-05-17T00:37:24.776125758Z" level=info msg="CreateContainer within sandbox \"a034a0571cabe8f372ef811f242bcffe4a997c7e89c06098cb1f94673df22b7e\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:37:24.794825 env[1439]: time="2025-05-17T00:37:24.794790681Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-62gkb,Uid:743f3978-1e30-43be-bbac-7fc87d373fb3,Namespace:tigera-operator,Attempt:0,}" May 17 00:37:24.830327 env[1439]: time="2025-05-17T00:37:24.830284645Z" level=info msg="CreateContainer within sandbox \"a034a0571cabe8f372ef811f242bcffe4a997c7e89c06098cb1f94673df22b7e\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"5737895a0e02f38602fa3df396765c56f90b983a9a2ea74fdf6f414339170e09\"" May 17 00:37:24.831825 env[1439]: time="2025-05-17T00:37:24.830770840Z" level=info msg="StartContainer for \"5737895a0e02f38602fa3df396765c56f90b983a9a2ea74fdf6f414339170e09\"" May 17 00:37:24.848537 systemd[1]: Started cri-containerd-5737895a0e02f38602fa3df396765c56f90b983a9a2ea74fdf6f414339170e09.scope. May 17 00:37:24.867486 env[1439]: time="2025-05-17T00:37:24.867395593Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:24.867486 env[1439]: time="2025-05-17T00:37:24.867449293Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:24.867718 env[1439]: time="2025-05-17T00:37:24.867464093Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:24.867718 env[1439]: time="2025-05-17T00:37:24.867656991Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fe2ca015233013d14d88ffa032ed91b6a16a289e13d1b58abc8a857141b28795 pid=2561 runtime=io.containerd.runc.v2 May 17 00:37:24.884125 systemd[1]: Started cri-containerd-fe2ca015233013d14d88ffa032ed91b6a16a289e13d1b58abc8a857141b28795.scope. May 17 00:37:24.890000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.890000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7ff1344e1018 items=0 ppid=2492 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:24.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333738393561306530326633383630326661336466333936373635 May 17 00:37:24.890000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.890000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.890000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.890000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.890000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.890000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.890000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.890000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.890000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.890000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.890000 audit: BPF prog-id=111 op=LOAD May 17 00:37:24.890000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000408208 items=0 ppid=2492 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:24.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333738393561306530326633383630326661336466333936373635 May 17 00:37:24.890000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.890000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.890000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.890000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.890000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.890000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.890000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.890000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.890000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.890000 audit: BPF prog-id=112 op=LOAD May 17 00:37:24.890000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000408258 items=0 ppid=2492 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:24.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333738393561306530326633383630326661336466333936373635 May 17 00:37:24.891000 audit: BPF prog-id=112 op=UNLOAD May 17 00:37:24.891000 audit: BPF prog-id=111 op=UNLOAD May 17 00:37:24.891000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.891000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.891000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.891000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.891000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.891000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.891000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.891000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.891000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.891000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.891000 audit: BPF prog-id=113 op=LOAD May 17 00:37:24.891000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0004082e8 items=0 ppid=2492 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:24.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333738393561306530326633383630326661336466333936373635 May 17 00:37:24.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.911000 audit: BPF prog-id=114 op=LOAD May 17 00:37:24.911000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.911000 audit[2572]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2561 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:24.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665326361303135323333303133643134643838666661303332656439 May 17 00:37:24.911000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.911000 audit[2572]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2561 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:24.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665326361303135323333303133643134643838666661303332656439 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit: BPF prog-id=115 op=LOAD May 17 00:37:24.912000 audit[2572]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003ba930 items=0 ppid=2561 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:24.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665326361303135323333303133643134643838666661303332656439 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit: BPF prog-id=116 op=LOAD May 17 00:37:24.912000 audit[2572]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003ba978 items=0 ppid=2561 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:24.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665326361303135323333303133643134643838666661303332656439 May 17 00:37:24.912000 audit: BPF prog-id=116 op=UNLOAD May 17 00:37:24.912000 audit: BPF prog-id=115 op=UNLOAD May 17 00:37:24.912000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:24.912000 audit: BPF prog-id=117 op=LOAD May 17 00:37:24.912000 audit[2572]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003bad88 items=0 ppid=2561 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:24.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665326361303135323333303133643134643838666661303332656439 May 17 00:37:24.930845 env[1439]: time="2025-05-17T00:37:24.930750393Z" level=info msg="StartContainer for \"5737895a0e02f38602fa3df396765c56f90b983a9a2ea74fdf6f414339170e09\" returns successfully" May 17 00:37:24.962014 env[1439]: time="2025-05-17T00:37:24.961970997Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-62gkb,Uid:743f3978-1e30-43be-bbac-7fc87d373fb3,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"fe2ca015233013d14d88ffa032ed91b6a16a289e13d1b58abc8a857141b28795\"" May 17 00:37:24.966479 env[1439]: time="2025-05-17T00:37:24.966437555Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\"" May 17 00:37:25.078000 audit[2637]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2637 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.078000 audit[2637]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1a84da50 a2=0 a3=7fff1a84da3c items=0 ppid=2549 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.078000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:37:25.080000 audit[2640]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2640 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.080000 audit[2640]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb4338bb0 a2=0 a3=7ffdb4338b9c items=0 ppid=2549 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.080000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:37:25.082000 audit[2639]: NETFILTER_CFG table=mangle:43 family=2 entries=1 op=nft_register_chain pid=2639 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.082000 audit[2639]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9e341960 a2=0 a3=7ffe9e34194c items=0 ppid=2549 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:37:25.083000 audit[2641]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2641 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.083000 audit[2641]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcea5dc260 a2=0 a3=7ffcea5dc24c items=0 ppid=2549 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.083000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:37:25.084000 audit[2643]: NETFILTER_CFG table=nat:45 family=2 entries=1 op=nft_register_chain pid=2643 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.088877 kernel: kauditd_printk_skb: 174 callbacks suppressed May 17 00:37:25.088932 kernel: audit: type=1325 audit(1747442245.084:840): table=nat:45 family=2 entries=1 op=nft_register_chain pid=2643 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.084000 audit[2643]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe31363d50 a2=0 a3=7ffe31363d3c items=0 ppid=2549 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.115005 kernel: audit: type=1300 audit(1747442245.084:840): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe31363d50 a2=0 a3=7ffe31363d3c items=0 ppid=2549 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.115123 kernel: audit: type=1327 audit(1747442245.084:840): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:37:25.084000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:37:25.094000 audit[2644]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=2644 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.138044 kernel: audit: type=1325 audit(1747442245.094:841): table=filter:46 family=2 entries=1 op=nft_register_chain pid=2644 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.138679 kernel: audit: type=1300 audit(1747442245.094:841): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7df49310 a2=0 a3=7ffe7df492fc items=0 ppid=2549 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.094000 audit[2644]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7df49310 a2=0 a3=7ffe7df492fc items=0 ppid=2549 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.162118 kernel: audit: type=1327 audit(1747442245.094:841): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:37:25.094000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:37:25.177000 audit[2645]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2645 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.192497 kernel: audit: type=1325 audit(1747442245.177:842): table=filter:47 family=2 entries=1 op=nft_register_chain pid=2645 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.177000 audit[2645]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd3ed55aa0 a2=0 a3=7ffd3ed55a8c items=0 ppid=2549 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.213521 kernel: audit: type=1300 audit(1747442245.177:842): arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd3ed55aa0 a2=0 a3=7ffd3ed55a8c items=0 ppid=2549 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.225541 kernel: audit: type=1327 audit(1747442245.177:842): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:37:25.177000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:37:25.183000 audit[2647]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2647 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.183000 audit[2647]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffea2844b40 a2=0 a3=7ffea2844b2c items=0 ppid=2549 pid=2647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.183000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:37:25.188000 audit[2650]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2650 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.188000 audit[2650]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffecb252990 a2=0 a3=7ffecb25297c items=0 ppid=2549 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.188000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:37:25.189000 audit[2651]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2651 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.189000 audit[2651]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe17587a70 a2=0 a3=7ffe17587a5c items=0 ppid=2549 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.189000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:37:25.192000 audit[2653]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2653 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.192000 audit[2653]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd93955ac0 a2=0 a3=7ffd93955aac items=0 ppid=2549 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.192000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:37:25.194000 audit[2654]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2654 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.194000 audit[2654]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9b2c2ca0 a2=0 a3=7ffe9b2c2c8c items=0 ppid=2549 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.194000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:37:25.197000 audit[2656]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2656 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.197000 audit[2656]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff0fbaf0d0 a2=0 a3=7fff0fbaf0bc items=0 ppid=2549 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.235419 kernel: audit: type=1325 audit(1747442245.183:843): table=filter:48 family=2 entries=1 op=nft_register_rule pid=2647 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.197000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:37:25.201000 audit[2659]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2659 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.201000 audit[2659]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc13ce0150 a2=0 a3=7ffc13ce013c items=0 ppid=2549 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.201000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:37:25.202000 audit[2660]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2660 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.202000 audit[2660]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff89a8a350 a2=0 a3=7fff89a8a33c items=0 ppid=2549 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.202000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:37:25.205000 audit[2662]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2662 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.205000 audit[2662]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe7de8ceb0 a2=0 a3=7ffe7de8ce9c items=0 ppid=2549 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.205000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:37:25.206000 audit[2663]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2663 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.206000 audit[2663]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7bd47550 a2=0 a3=7ffe7bd4753c items=0 ppid=2549 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:37:25.209000 audit[2665]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2665 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.209000 audit[2665]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1e3b3bb0 a2=0 a3=7fff1e3b3b9c items=0 ppid=2549 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.209000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:37:25.215000 audit[2668]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2668 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.215000 audit[2668]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb72ea8b0 a2=0 a3=7ffcb72ea89c items=0 ppid=2549 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.215000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:37:25.220000 audit[2671]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2671 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.220000 audit[2671]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff5824fda0 a2=0 a3=7fff5824fd8c items=0 ppid=2549 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.220000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:37:25.221000 audit[2672]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2672 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.221000 audit[2672]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffba43cc90 a2=0 a3=7fffba43cc7c items=0 ppid=2549 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.221000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:37:25.226000 audit[2674]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2674 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.226000 audit[2674]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffcdd9656d0 a2=0 a3=7ffcdd9656bc items=0 ppid=2549 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:37:25.230000 audit[2677]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2677 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.230000 audit[2677]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdcf101a10 a2=0 a3=7ffdcf1019fc items=0 ppid=2549 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.230000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:37:25.231000 audit[2678]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2678 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.231000 audit[2678]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2f239ae0 a2=0 a3=7ffe2f239acc items=0 ppid=2549 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.231000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:37:25.238000 audit[2680]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2680 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:25.238000 audit[2680]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffec11589b0 a2=0 a3=7ffec115899c items=0 ppid=2549 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.238000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:37:25.328000 audit[2686]: NETFILTER_CFG table=filter:66 family=2 entries=8 op=nft_register_rule pid=2686 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:25.328000 audit[2686]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fffa9a5e4a0 a2=0 a3=7fffa9a5e48c items=0 ppid=2549 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.328000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:25.357000 audit[2686]: NETFILTER_CFG table=nat:67 family=2 entries=14 op=nft_register_chain pid=2686 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:25.357000 audit[2686]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fffa9a5e4a0 a2=0 a3=7fffa9a5e48c items=0 ppid=2549 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.357000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:25.358000 audit[2691]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2691 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.358000 audit[2691]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff01aa4a30 a2=0 a3=7fff01aa4a1c items=0 ppid=2549 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.358000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:37:25.361000 audit[2693]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2693 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.361000 audit[2693]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc5d43be20 a2=0 a3=7ffc5d43be0c items=0 ppid=2549 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.361000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:37:25.365000 audit[2696]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2696 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.365000 audit[2696]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe494e9f30 a2=0 a3=7ffe494e9f1c items=0 ppid=2549 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.365000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:37:25.366000 audit[2697]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2697 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.366000 audit[2697]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1320a630 a2=0 a3=7ffc1320a61c items=0 ppid=2549 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.366000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:37:25.369000 audit[2699]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2699 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.369000 audit[2699]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe1cc18230 a2=0 a3=7ffe1cc1821c items=0 ppid=2549 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.369000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:37:25.370000 audit[2700]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2700 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.370000 audit[2700]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb65ef200 a2=0 a3=7fffb65ef1ec items=0 ppid=2549 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.370000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:37:25.372000 audit[2702]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2702 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.372000 audit[2702]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd78e52fe0 a2=0 a3=7ffd78e52fcc items=0 ppid=2549 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.372000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:37:25.376000 audit[2705]: NETFILTER_CFG table=filter:75 family=10 entries=2 op=nft_register_chain pid=2705 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.376000 audit[2705]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffdff5ecb20 a2=0 a3=7ffdff5ecb0c items=0 ppid=2549 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.376000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:37:25.377000 audit[2706]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2706 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.377000 audit[2706]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbadcdaa0 a2=0 a3=7ffdbadcda8c items=0 ppid=2549 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.377000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:37:25.379000 audit[2708]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.379000 audit[2708]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdf3a121c0 a2=0 a3=7ffdf3a121ac items=0 ppid=2549 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.379000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:37:25.380000 audit[2709]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2709 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.380000 audit[2709]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc92f3d1e0 a2=0 a3=7ffc92f3d1cc items=0 ppid=2549 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.380000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:37:25.383000 audit[2711]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.383000 audit[2711]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc3dad6b60 a2=0 a3=7ffc3dad6b4c items=0 ppid=2549 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.383000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:37:25.387000 audit[2714]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2714 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.387000 audit[2714]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff093327e0 a2=0 a3=7fff093327cc items=0 ppid=2549 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.387000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:37:25.390000 audit[2717]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.390000 audit[2717]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe03b5a090 a2=0 a3=7ffe03b5a07c items=0 ppid=2549 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.390000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:37:25.391000 audit[2718]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2718 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.391000 audit[2718]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffca5ac1840 a2=0 a3=7ffca5ac182c items=0 ppid=2549 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.391000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:37:25.393000 audit[2720]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.393000 audit[2720]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd57556f40 a2=0 a3=7ffd57556f2c items=0 ppid=2549 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.393000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:37:25.397000 audit[2723]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2723 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.397000 audit[2723]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff109ab550 a2=0 a3=7fff109ab53c items=0 ppid=2549 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.397000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:37:25.398000 audit[2724]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2724 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.398000 audit[2724]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2cfd4030 a2=0 a3=7ffc2cfd401c items=0 ppid=2549 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.398000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:37:25.400000 audit[2726]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2726 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.400000 audit[2726]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcbd43d590 a2=0 a3=7ffcbd43d57c items=0 ppid=2549 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.400000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:37:25.401000 audit[2727]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2727 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.401000 audit[2727]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdfe7744a0 a2=0 a3=7ffdfe77448c items=0 ppid=2549 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.401000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:37:25.404000 audit[2729]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2729 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.404000 audit[2729]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffb516cff0 a2=0 a3=7fffb516cfdc items=0 ppid=2549 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.404000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:37:25.410000 audit[2732]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:25.410000 audit[2732]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdc2d92d70 a2=0 a3=7ffdc2d92d5c items=0 ppid=2549 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.410000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:37:25.413000 audit[2734]: NETFILTER_CFG table=filter:90 family=10 entries=3 op=nft_register_rule pid=2734 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:37:25.413000 audit[2734]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffdf1fbb7e0 a2=0 a3=7ffdf1fbb7cc items=0 ppid=2549 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.413000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:25.413000 audit[2734]: NETFILTER_CFG table=nat:91 family=10 entries=7 op=nft_register_chain pid=2734 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:37:25.413000 audit[2734]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffdf1fbb7e0 a2=0 a3=7ffdf1fbb7cc items=0 ppid=2549 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.413000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:25.550064 systemd[1]: run-containerd-runc-k8s.io-a034a0571cabe8f372ef811f242bcffe4a997c7e89c06098cb1f94673df22b7e-runc.9XwH1N.mount: Deactivated successfully. May 17 00:37:26.582525 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2648882656.mount: Deactivated successfully. May 17 00:37:27.381740 env[1439]: time="2025-05-17T00:37:27.381692704Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:27.386496 env[1439]: time="2025-05-17T00:37:27.386459962Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:27.389700 env[1439]: time="2025-05-17T00:37:27.389667734Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:27.392421 env[1439]: time="2025-05-17T00:37:27.392389710Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:27.392946 env[1439]: time="2025-05-17T00:37:27.392902206Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\" returns image reference \"sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033\"" May 17 00:37:27.395875 env[1439]: time="2025-05-17T00:37:27.395846180Z" level=info msg="CreateContainer within sandbox \"fe2ca015233013d14d88ffa032ed91b6a16a289e13d1b58abc8a857141b28795\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 17 00:37:27.425008 env[1439]: time="2025-05-17T00:37:27.424967226Z" level=info msg="CreateContainer within sandbox \"fe2ca015233013d14d88ffa032ed91b6a16a289e13d1b58abc8a857141b28795\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"314e0dbe00a8f2ead843b2c9efc760673435549ebe8fb31c1f1c4e9404fba8f2\"" May 17 00:37:27.426516 env[1439]: time="2025-05-17T00:37:27.426483112Z" level=info msg="StartContainer for \"314e0dbe00a8f2ead843b2c9efc760673435549ebe8fb31c1f1c4e9404fba8f2\"" May 17 00:37:27.453834 systemd[1]: Started cri-containerd-314e0dbe00a8f2ead843b2c9efc760673435549ebe8fb31c1f1c4e9404fba8f2.scope. May 17 00:37:27.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.464000 audit: BPF prog-id=118 op=LOAD May 17 00:37:27.465000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2561 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:27.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331346530646265303061386632656164383433623263396566633736 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2561 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:27.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331346530646265303061386632656164383433623263396566633736 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit: BPF prog-id=119 op=LOAD May 17 00:37:27.465000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003a6ed0 items=0 ppid=2561 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:27.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331346530646265303061386632656164383433623263396566633736 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit: BPF prog-id=120 op=LOAD May 17 00:37:27.465000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003a6f18 items=0 ppid=2561 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:27.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331346530646265303061386632656164383433623263396566633736 May 17 00:37:27.465000 audit: BPF prog-id=120 op=UNLOAD May 17 00:37:27.465000 audit: BPF prog-id=119 op=UNLOAD May 17 00:37:27.465000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { perfmon } for pid=2744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit[2744]: AVC avc: denied { bpf } for pid=2744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:27.465000 audit: BPF prog-id=121 op=LOAD May 17 00:37:27.465000 audit[2744]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a7328 items=0 ppid=2561 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:27.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331346530646265303061386632656164383433623263396566633736 May 17 00:37:27.483735 env[1439]: time="2025-05-17T00:37:27.483692713Z" level=info msg="StartContainer for \"314e0dbe00a8f2ead843b2c9efc760673435549ebe8fb31c1f1c4e9404fba8f2\" returns successfully" May 17 00:37:27.583138 systemd[1]: run-containerd-runc-k8s.io-314e0dbe00a8f2ead843b2c9efc760673435549ebe8fb31c1f1c4e9404fba8f2-runc.fWU86f.mount: Deactivated successfully. May 17 00:37:28.065110 kubelet[2441]: I0517 00:37:28.065033 2441 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-7lr5q" podStartSLOduration=4.065011348 podStartE2EDuration="4.065011348s" podCreationTimestamp="2025-05-17 00:37:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:37:25.059121992 +0000 UTC m=+8.160914113" watchObservedRunningTime="2025-05-17 00:37:28.065011348 +0000 UTC m=+11.166803369" May 17 00:37:28.864745 kubelet[2441]: I0517 00:37:28.864665 2441 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-844669ff44-62gkb" podStartSLOduration=2.434081732 podStartE2EDuration="4.864640346s" podCreationTimestamp="2025-05-17 00:37:24 +0000 UTC" firstStartedPulling="2025-05-17 00:37:24.963527682 +0000 UTC m=+8.065319703" lastFinishedPulling="2025-05-17 00:37:27.394086296 +0000 UTC m=+10.495878317" observedRunningTime="2025-05-17 00:37:28.066538535 +0000 UTC m=+11.168330656" watchObservedRunningTime="2025-05-17 00:37:28.864640346 +0000 UTC m=+11.966432467" May 17 00:37:33.907011 sudo[1748]: pam_unix(sudo:session): session closed for user root May 17 00:37:33.914236 kernel: kauditd_printk_skb: 188 callbacks suppressed May 17 00:37:33.914365 kernel: audit: type=1106 audit(1747442253.907:905): pid=1748 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:37:33.907000 audit[1748]: USER_END pid=1748 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:37:33.912000 audit[1748]: CRED_DISP pid=1748 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:37:33.946369 kernel: audit: type=1104 audit(1747442253.912:906): pid=1748 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:37:34.017117 sshd[1743]: pam_unix(sshd:session): session closed for user core May 17 00:37:34.018000 audit[1743]: USER_END pid=1743 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:34.041371 kernel: audit: type=1106 audit(1747442254.018:907): pid=1743 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:34.041881 systemd[1]: sshd@6-10.200.4.17:22-10.200.16.10:57018.service: Deactivated successfully. May 17 00:37:34.043394 systemd[1]: session-9.scope: Deactivated successfully. May 17 00:37:34.043607 systemd[1]: session-9.scope: Consumed 4.027s CPU time. May 17 00:37:34.044316 systemd-logind[1422]: Session 9 logged out. Waiting for processes to exit. May 17 00:37:34.045985 systemd-logind[1422]: Removed session 9. May 17 00:37:34.018000 audit[1743]: CRED_DISP pid=1743 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:34.062376 kernel: audit: type=1104 audit(1747442254.018:908): pid=1743 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:34.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.17:22-10.200.16.10:57018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:34.080374 kernel: audit: type=1131 audit(1747442254.041:909): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.17:22-10.200.16.10:57018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:35.070000 audit[2821]: NETFILTER_CFG table=filter:92 family=2 entries=15 op=nft_register_rule pid=2821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:35.083471 kernel: audit: type=1325 audit(1747442255.070:910): table=filter:92 family=2 entries=15 op=nft_register_rule pid=2821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:35.070000 audit[2821]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd5a59e860 a2=0 a3=7ffd5a59e84c items=0 ppid=2549 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.119481 kernel: audit: type=1300 audit(1747442255.070:910): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd5a59e860 a2=0 a3=7ffd5a59e84c items=0 ppid=2549 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.070000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:35.135707 kernel: audit: type=1327 audit(1747442255.070:910): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:35.097000 audit[2821]: NETFILTER_CFG table=nat:93 family=2 entries=12 op=nft_register_rule pid=2821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:35.168790 kernel: audit: type=1325 audit(1747442255.097:911): table=nat:93 family=2 entries=12 op=nft_register_rule pid=2821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:35.168949 kernel: audit: type=1300 audit(1747442255.097:911): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd5a59e860 a2=0 a3=0 items=0 ppid=2549 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.097000 audit[2821]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd5a59e860 a2=0 a3=0 items=0 ppid=2549 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.097000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:35.149000 audit[2823]: NETFILTER_CFG table=filter:94 family=2 entries=16 op=nft_register_rule pid=2823 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:35.149000 audit[2823]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd43404690 a2=0 a3=7ffd4340467c items=0 ppid=2549 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.149000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:35.190000 audit[2823]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2823 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:35.190000 audit[2823]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd43404690 a2=0 a3=0 items=0 ppid=2549 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:35.190000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:37.697000 audit[2825]: NETFILTER_CFG table=filter:96 family=2 entries=17 op=nft_register_rule pid=2825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:37.697000 audit[2825]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fff6bbbdbe0 a2=0 a3=7fff6bbbdbcc items=0 ppid=2549 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:37.697000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:37.704000 audit[2825]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=2825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:37.704000 audit[2825]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff6bbbdbe0 a2=0 a3=0 items=0 ppid=2549 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:37.704000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:37.833000 audit[2827]: NETFILTER_CFG table=filter:98 family=2 entries=18 op=nft_register_rule pid=2827 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:37.833000 audit[2827]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffcdfa558e0 a2=0 a3=7ffcdfa558cc items=0 ppid=2549 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:37.833000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:37.837000 audit[2827]: NETFILTER_CFG table=nat:99 family=2 entries=12 op=nft_register_rule pid=2827 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:37.837000 audit[2827]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcdfa558e0 a2=0 a3=0 items=0 ppid=2549 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:37.837000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:38.047169 systemd[1]: Created slice kubepods-besteffort-pod6b3d129b_9fad_45fd_abc7_fa22ce198b78.slice. May 17 00:37:38.129735 kubelet[2441]: I0517 00:37:38.129686 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qkqnx\" (UniqueName: \"kubernetes.io/projected/6b3d129b-9fad-45fd-abc7-fa22ce198b78-kube-api-access-qkqnx\") pod \"calico-typha-d944878fb-k4qtr\" (UID: \"6b3d129b-9fad-45fd-abc7-fa22ce198b78\") " pod="calico-system/calico-typha-d944878fb-k4qtr" May 17 00:37:38.130148 kubelet[2441]: I0517 00:37:38.129750 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6b3d129b-9fad-45fd-abc7-fa22ce198b78-tigera-ca-bundle\") pod \"calico-typha-d944878fb-k4qtr\" (UID: \"6b3d129b-9fad-45fd-abc7-fa22ce198b78\") " pod="calico-system/calico-typha-d944878fb-k4qtr" May 17 00:37:38.130148 kubelet[2441]: I0517 00:37:38.129778 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/6b3d129b-9fad-45fd-abc7-fa22ce198b78-typha-certs\") pod \"calico-typha-d944878fb-k4qtr\" (UID: \"6b3d129b-9fad-45fd-abc7-fa22ce198b78\") " pod="calico-system/calico-typha-d944878fb-k4qtr" May 17 00:37:38.351712 env[1439]: time="2025-05-17T00:37:38.351590096Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-d944878fb-k4qtr,Uid:6b3d129b-9fad-45fd-abc7-fa22ce198b78,Namespace:calico-system,Attempt:0,}" May 17 00:37:38.387988 env[1439]: time="2025-05-17T00:37:38.387767459Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:38.387988 env[1439]: time="2025-05-17T00:37:38.387813258Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:38.387988 env[1439]: time="2025-05-17T00:37:38.387846358Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:38.388253 env[1439]: time="2025-05-17T00:37:38.388102856Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/89b688d3778ab0f72ceebe1ff1d296cf0a3acfb8a95db9e43e1846ba7d183c12 pid=2838 runtime=io.containerd.runc.v2 May 17 00:37:38.418717 systemd[1]: Started cri-containerd-89b688d3778ab0f72ceebe1ff1d296cf0a3acfb8a95db9e43e1846ba7d183c12.scope. May 17 00:37:38.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.438000 audit: BPF prog-id=122 op=LOAD May 17 00:37:38.439000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2838 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839623638386433373738616230663732636565626531666631643239 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2838 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839623638386433373738616230663732636565626531666631643239 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit: BPF prog-id=123 op=LOAD May 17 00:37:38.439000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024be0 items=0 ppid=2838 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839623638386433373738616230663732636565626531666631643239 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit: BPF prog-id=124 op=LOAD May 17 00:37:38.439000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024c28 items=0 ppid=2838 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839623638386433373738616230663732636565626531666631643239 May 17 00:37:38.439000 audit: BPF prog-id=124 op=UNLOAD May 17 00:37:38.439000 audit: BPF prog-id=123 op=UNLOAD May 17 00:37:38.439000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.439000 audit: BPF prog-id=125 op=LOAD May 17 00:37:38.439000 audit[2849]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025038 items=0 ppid=2838 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839623638386433373738616230663732636565626531666631643239 May 17 00:37:38.462016 systemd[1]: Created slice kubepods-besteffort-pod75d56078_bcf8_4f15_8b4f_d6e349514b2d.slice. May 17 00:37:38.492290 env[1439]: time="2025-05-17T00:37:38.492231073Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-d944878fb-k4qtr,Uid:6b3d129b-9fad-45fd-abc7-fa22ce198b78,Namespace:calico-system,Attempt:0,} returns sandbox id \"89b688d3778ab0f72ceebe1ff1d296cf0a3acfb8a95db9e43e1846ba7d183c12\"" May 17 00:37:38.494614 env[1439]: time="2025-05-17T00:37:38.494574458Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\"" May 17 00:37:38.531668 kubelet[2441]: I0517 00:37:38.531623 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/75d56078-bcf8-4f15-8b4f-d6e349514b2d-cni-log-dir\") pod \"calico-node-m6z75\" (UID: \"75d56078-bcf8-4f15-8b4f-d6e349514b2d\") " pod="calico-system/calico-node-m6z75" May 17 00:37:38.531668 kubelet[2441]: I0517 00:37:38.531669 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/75d56078-bcf8-4f15-8b4f-d6e349514b2d-policysync\") pod \"calico-node-m6z75\" (UID: \"75d56078-bcf8-4f15-8b4f-d6e349514b2d\") " pod="calico-system/calico-node-m6z75" May 17 00:37:38.531951 kubelet[2441]: I0517 00:37:38.531694 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/75d56078-bcf8-4f15-8b4f-d6e349514b2d-cni-net-dir\") pod \"calico-node-m6z75\" (UID: \"75d56078-bcf8-4f15-8b4f-d6e349514b2d\") " pod="calico-system/calico-node-m6z75" May 17 00:37:38.531951 kubelet[2441]: I0517 00:37:38.531714 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/75d56078-bcf8-4f15-8b4f-d6e349514b2d-cni-bin-dir\") pod \"calico-node-m6z75\" (UID: \"75d56078-bcf8-4f15-8b4f-d6e349514b2d\") " pod="calico-system/calico-node-m6z75" May 17 00:37:38.531951 kubelet[2441]: I0517 00:37:38.531733 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/75d56078-bcf8-4f15-8b4f-d6e349514b2d-flexvol-driver-host\") pod \"calico-node-m6z75\" (UID: \"75d56078-bcf8-4f15-8b4f-d6e349514b2d\") " pod="calico-system/calico-node-m6z75" May 17 00:37:38.531951 kubelet[2441]: I0517 00:37:38.531754 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/75d56078-bcf8-4f15-8b4f-d6e349514b2d-node-certs\") pod \"calico-node-m6z75\" (UID: \"75d56078-bcf8-4f15-8b4f-d6e349514b2d\") " pod="calico-system/calico-node-m6z75" May 17 00:37:38.531951 kubelet[2441]: I0517 00:37:38.531774 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/75d56078-bcf8-4f15-8b4f-d6e349514b2d-tigera-ca-bundle\") pod \"calico-node-m6z75\" (UID: \"75d56078-bcf8-4f15-8b4f-d6e349514b2d\") " pod="calico-system/calico-node-m6z75" May 17 00:37:38.532115 kubelet[2441]: I0517 00:37:38.531800 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/75d56078-bcf8-4f15-8b4f-d6e349514b2d-lib-modules\") pod \"calico-node-m6z75\" (UID: \"75d56078-bcf8-4f15-8b4f-d6e349514b2d\") " pod="calico-system/calico-node-m6z75" May 17 00:37:38.532115 kubelet[2441]: I0517 00:37:38.531824 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/75d56078-bcf8-4f15-8b4f-d6e349514b2d-var-lib-calico\") pod \"calico-node-m6z75\" (UID: \"75d56078-bcf8-4f15-8b4f-d6e349514b2d\") " pod="calico-system/calico-node-m6z75" May 17 00:37:38.532115 kubelet[2441]: I0517 00:37:38.531843 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/75d56078-bcf8-4f15-8b4f-d6e349514b2d-var-run-calico\") pod \"calico-node-m6z75\" (UID: \"75d56078-bcf8-4f15-8b4f-d6e349514b2d\") " pod="calico-system/calico-node-m6z75" May 17 00:37:38.532115 kubelet[2441]: I0517 00:37:38.531866 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/75d56078-bcf8-4f15-8b4f-d6e349514b2d-xtables-lock\") pod \"calico-node-m6z75\" (UID: \"75d56078-bcf8-4f15-8b4f-d6e349514b2d\") " pod="calico-system/calico-node-m6z75" May 17 00:37:38.532115 kubelet[2441]: I0517 00:37:38.531888 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ls44k\" (UniqueName: \"kubernetes.io/projected/75d56078-bcf8-4f15-8b4f-d6e349514b2d-kube-api-access-ls44k\") pod \"calico-node-m6z75\" (UID: \"75d56078-bcf8-4f15-8b4f-d6e349514b2d\") " pod="calico-system/calico-node-m6z75" May 17 00:37:38.634565 kubelet[2441]: E0517 00:37:38.634534 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.634796 kubelet[2441]: W0517 00:37:38.634776 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.634936 kubelet[2441]: E0517 00:37:38.634920 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.638005 kubelet[2441]: E0517 00:37:38.637982 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.638111 kubelet[2441]: W0517 00:37:38.637999 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.638111 kubelet[2441]: E0517 00:37:38.638028 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.645230 kubelet[2441]: E0517 00:37:38.645207 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.645230 kubelet[2441]: W0517 00:37:38.645229 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.645443 kubelet[2441]: E0517 00:37:38.645246 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.716313 kubelet[2441]: E0517 00:37:38.716265 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fccc4" podUID="ebc6cbc0-e584-4665-8b37-7cb92cbebceb" May 17 00:37:38.717282 kubelet[2441]: E0517 00:37:38.717250 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.717456 kubelet[2441]: W0517 00:37:38.717438 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.717576 kubelet[2441]: E0517 00:37:38.717560 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.718459 kubelet[2441]: E0517 00:37:38.718435 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.718584 kubelet[2441]: W0517 00:37:38.718568 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.718704 kubelet[2441]: E0517 00:37:38.718680 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.718961 kubelet[2441]: E0517 00:37:38.718941 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.718961 kubelet[2441]: W0517 00:37:38.718957 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.719078 kubelet[2441]: E0517 00:37:38.718973 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.719539 kubelet[2441]: E0517 00:37:38.719492 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.719539 kubelet[2441]: W0517 00:37:38.719526 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.719698 kubelet[2441]: E0517 00:37:38.719541 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.719827 kubelet[2441]: E0517 00:37:38.719806 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.719827 kubelet[2441]: W0517 00:37:38.719831 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.719958 kubelet[2441]: E0517 00:37:38.719846 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.720069 kubelet[2441]: E0517 00:37:38.720051 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.720137 kubelet[2441]: W0517 00:37:38.720069 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.720137 kubelet[2441]: E0517 00:37:38.720090 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.720358 kubelet[2441]: E0517 00:37:38.720319 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.720434 kubelet[2441]: W0517 00:37:38.720370 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.720434 kubelet[2441]: E0517 00:37:38.720386 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.720632 kubelet[2441]: E0517 00:37:38.720613 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.720632 kubelet[2441]: W0517 00:37:38.720631 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.720744 kubelet[2441]: E0517 00:37:38.720652 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.720880 kubelet[2441]: E0517 00:37:38.720867 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.720943 kubelet[2441]: W0517 00:37:38.720880 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.720943 kubelet[2441]: E0517 00:37:38.720893 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.721124 kubelet[2441]: E0517 00:37:38.721106 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.721124 kubelet[2441]: W0517 00:37:38.721123 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.721226 kubelet[2441]: E0517 00:37:38.721157 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.721431 kubelet[2441]: E0517 00:37:38.721411 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.721431 kubelet[2441]: W0517 00:37:38.721429 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.721571 kubelet[2441]: E0517 00:37:38.721443 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.721668 kubelet[2441]: E0517 00:37:38.721651 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.721725 kubelet[2441]: W0517 00:37:38.721668 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.721725 kubelet[2441]: E0517 00:37:38.721689 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.721921 kubelet[2441]: E0517 00:37:38.721905 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.721921 kubelet[2441]: W0517 00:37:38.721921 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.722038 kubelet[2441]: E0517 00:37:38.721934 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.722188 kubelet[2441]: E0517 00:37:38.722161 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.722188 kubelet[2441]: W0517 00:37:38.722179 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.722319 kubelet[2441]: E0517 00:37:38.722200 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.722422 kubelet[2441]: E0517 00:37:38.722406 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.722491 kubelet[2441]: W0517 00:37:38.722422 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.722491 kubelet[2441]: E0517 00:37:38.722444 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.722665 kubelet[2441]: E0517 00:37:38.722649 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.722741 kubelet[2441]: W0517 00:37:38.722665 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.722741 kubelet[2441]: E0517 00:37:38.722678 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.722926 kubelet[2441]: E0517 00:37:38.722900 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.722926 kubelet[2441]: W0517 00:37:38.722916 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.723030 kubelet[2441]: E0517 00:37:38.722929 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.724517 kubelet[2441]: E0517 00:37:38.723259 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.724610 kubelet[2441]: W0517 00:37:38.724518 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.724610 kubelet[2441]: E0517 00:37:38.724535 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.728465 kubelet[2441]: E0517 00:37:38.728445 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.728557 kubelet[2441]: W0517 00:37:38.728466 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.728557 kubelet[2441]: E0517 00:37:38.728482 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.728712 kubelet[2441]: E0517 00:37:38.728694 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.728767 kubelet[2441]: W0517 00:37:38.728713 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.728767 kubelet[2441]: E0517 00:37:38.728727 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.733991 kubelet[2441]: E0517 00:37:38.733975 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.734104 kubelet[2441]: W0517 00:37:38.734090 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.734192 kubelet[2441]: E0517 00:37:38.734177 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.734312 kubelet[2441]: I0517 00:37:38.734296 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ebc6cbc0-e584-4665-8b37-7cb92cbebceb-kubelet-dir\") pod \"csi-node-driver-fccc4\" (UID: \"ebc6cbc0-e584-4665-8b37-7cb92cbebceb\") " pod="calico-system/csi-node-driver-fccc4" May 17 00:37:38.734644 kubelet[2441]: E0517 00:37:38.734625 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.734644 kubelet[2441]: W0517 00:37:38.734640 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.734779 kubelet[2441]: E0517 00:37:38.734659 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.734926 kubelet[2441]: E0517 00:37:38.734897 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.734926 kubelet[2441]: W0517 00:37:38.734913 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.735056 kubelet[2441]: E0517 00:37:38.734931 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.735143 kubelet[2441]: E0517 00:37:38.735124 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.735143 kubelet[2441]: W0517 00:37:38.735139 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.735244 kubelet[2441]: E0517 00:37:38.735153 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.735244 kubelet[2441]: I0517 00:37:38.735181 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ebc6cbc0-e584-4665-8b37-7cb92cbebceb-socket-dir\") pod \"csi-node-driver-fccc4\" (UID: \"ebc6cbc0-e584-4665-8b37-7cb92cbebceb\") " pod="calico-system/csi-node-driver-fccc4" May 17 00:37:38.735463 kubelet[2441]: E0517 00:37:38.735438 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.735566 kubelet[2441]: W0517 00:37:38.735551 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.735662 kubelet[2441]: E0517 00:37:38.735646 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.735775 kubelet[2441]: I0517 00:37:38.735759 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z4xg5\" (UniqueName: \"kubernetes.io/projected/ebc6cbc0-e584-4665-8b37-7cb92cbebceb-kube-api-access-z4xg5\") pod \"csi-node-driver-fccc4\" (UID: \"ebc6cbc0-e584-4665-8b37-7cb92cbebceb\") " pod="calico-system/csi-node-driver-fccc4" May 17 00:37:38.735861 kubelet[2441]: E0517 00:37:38.735843 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.735916 kubelet[2441]: W0517 00:37:38.735863 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.735973 kubelet[2441]: E0517 00:37:38.735904 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.736206 kubelet[2441]: E0517 00:37:38.736168 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.736206 kubelet[2441]: W0517 00:37:38.736187 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.736206 kubelet[2441]: E0517 00:37:38.736205 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.736439 kubelet[2441]: E0517 00:37:38.736421 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.736494 kubelet[2441]: W0517 00:37:38.736441 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.736494 kubelet[2441]: E0517 00:37:38.736459 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.736494 kubelet[2441]: I0517 00:37:38.736484 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ebc6cbc0-e584-4665-8b37-7cb92cbebceb-registration-dir\") pod \"csi-node-driver-fccc4\" (UID: \"ebc6cbc0-e584-4665-8b37-7cb92cbebceb\") " pod="calico-system/csi-node-driver-fccc4" May 17 00:37:38.736730 kubelet[2441]: E0517 00:37:38.736709 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.736730 kubelet[2441]: W0517 00:37:38.736729 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.736847 kubelet[2441]: E0517 00:37:38.736746 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.736847 kubelet[2441]: I0517 00:37:38.736767 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ebc6cbc0-e584-4665-8b37-7cb92cbebceb-varrun\") pod \"csi-node-driver-fccc4\" (UID: \"ebc6cbc0-e584-4665-8b37-7cb92cbebceb\") " pod="calico-system/csi-node-driver-fccc4" May 17 00:37:38.736991 kubelet[2441]: E0517 00:37:38.736975 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.737067 kubelet[2441]: W0517 00:37:38.736992 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.737135 kubelet[2441]: E0517 00:37:38.737076 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.737218 kubelet[2441]: E0517 00:37:38.737202 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.737282 kubelet[2441]: W0517 00:37:38.737219 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.737337 kubelet[2441]: E0517 00:37:38.737303 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.737454 kubelet[2441]: E0517 00:37:38.737439 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.737525 kubelet[2441]: W0517 00:37:38.737455 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.737525 kubelet[2441]: E0517 00:37:38.737473 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.737670 kubelet[2441]: E0517 00:37:38.737654 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.737735 kubelet[2441]: W0517 00:37:38.737672 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.737735 kubelet[2441]: E0517 00:37:38.737686 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.737895 kubelet[2441]: E0517 00:37:38.737879 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.737970 kubelet[2441]: W0517 00:37:38.737896 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.737970 kubelet[2441]: E0517 00:37:38.737912 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.738671 kubelet[2441]: E0517 00:37:38.738102 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.738671 kubelet[2441]: W0517 00:37:38.738115 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.738671 kubelet[2441]: E0517 00:37:38.738128 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.766154 env[1439]: time="2025-05-17T00:37:38.765789379Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-m6z75,Uid:75d56078-bcf8-4f15-8b4f-d6e349514b2d,Namespace:calico-system,Attempt:0,}" May 17 00:37:38.804096 env[1439]: time="2025-05-17T00:37:38.804033028Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:38.804303 env[1439]: time="2025-05-17T00:37:38.804274526Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:38.804547 env[1439]: time="2025-05-17T00:37:38.804514525Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:38.804823 env[1439]: time="2025-05-17T00:37:38.804785723Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5abaccfcc7a1979cd7dc2d9516b7c2bf3f0d7eee839d17ac8135800d42c12b9a pid=2916 runtime=io.containerd.runc.v2 May 17 00:37:38.837781 systemd[1]: Started cri-containerd-5abaccfcc7a1979cd7dc2d9516b7c2bf3f0d7eee839d17ac8135800d42c12b9a.scope. May 17 00:37:38.842136 kubelet[2441]: E0517 00:37:38.842110 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.842136 kubelet[2441]: W0517 00:37:38.842130 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.842320 kubelet[2441]: E0517 00:37:38.842155 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.842557 kubelet[2441]: E0517 00:37:38.842530 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.842557 kubelet[2441]: W0517 00:37:38.842545 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.842702 kubelet[2441]: E0517 00:37:38.842565 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.842835 kubelet[2441]: E0517 00:37:38.842814 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.842835 kubelet[2441]: W0517 00:37:38.842831 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.842835 kubelet[2441]: E0517 00:37:38.842849 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.843094 kubelet[2441]: E0517 00:37:38.843077 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.843094 kubelet[2441]: W0517 00:37:38.843091 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.843230 kubelet[2441]: E0517 00:37:38.843108 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.844654 kubelet[2441]: E0517 00:37:38.843356 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.844654 kubelet[2441]: W0517 00:37:38.843370 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.844654 kubelet[2441]: E0517 00:37:38.843388 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.844654 kubelet[2441]: E0517 00:37:38.843630 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.844654 kubelet[2441]: W0517 00:37:38.843640 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.844654 kubelet[2441]: E0517 00:37:38.843719 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.844654 kubelet[2441]: E0517 00:37:38.843839 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.844654 kubelet[2441]: W0517 00:37:38.843848 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.844654 kubelet[2441]: E0517 00:37:38.843929 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.844654 kubelet[2441]: E0517 00:37:38.844045 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.845160 kubelet[2441]: W0517 00:37:38.844054 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.845160 kubelet[2441]: E0517 00:37:38.844128 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.845160 kubelet[2441]: E0517 00:37:38.844247 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.845160 kubelet[2441]: W0517 00:37:38.844256 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.845160 kubelet[2441]: E0517 00:37:38.844355 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.845160 kubelet[2441]: E0517 00:37:38.844523 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.845160 kubelet[2441]: W0517 00:37:38.844534 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.845160 kubelet[2441]: E0517 00:37:38.844550 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.846075 kubelet[2441]: E0517 00:37:38.845876 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.846075 kubelet[2441]: W0517 00:37:38.845900 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.846075 kubelet[2441]: E0517 00:37:38.846004 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.846412 kubelet[2441]: E0517 00:37:38.846395 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.846570 kubelet[2441]: W0517 00:37:38.846531 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.846812 kubelet[2441]: E0517 00:37:38.846796 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.847069 kubelet[2441]: E0517 00:37:38.847045 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.847180 kubelet[2441]: W0517 00:37:38.847165 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.849398 kubelet[2441]: E0517 00:37:38.849375 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.849684 kubelet[2441]: E0517 00:37:38.849670 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.849786 kubelet[2441]: W0517 00:37:38.849773 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.849957 kubelet[2441]: E0517 00:37:38.849943 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.850175 kubelet[2441]: E0517 00:37:38.850163 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.850267 kubelet[2441]: W0517 00:37:38.850256 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.851227 kubelet[2441]: E0517 00:37:38.851209 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.851527 kubelet[2441]: E0517 00:37:38.851512 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.852381 kubelet[2441]: W0517 00:37:38.852364 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.852612 kubelet[2441]: E0517 00:37:38.852595 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.853302 kubelet[2441]: E0517 00:37:38.853286 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.853437 kubelet[2441]: W0517 00:37:38.853421 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.853623 kubelet[2441]: E0517 00:37:38.853609 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.853879 kubelet[2441]: E0517 00:37:38.853860 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.854024 kubelet[2441]: W0517 00:37:38.854011 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.854880 kubelet[2441]: E0517 00:37:38.854838 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.855218 kubelet[2441]: E0517 00:37:38.855205 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.855308 kubelet[2441]: W0517 00:37:38.855297 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.855525 kubelet[2441]: E0517 00:37:38.855511 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.855748 kubelet[2441]: E0517 00:37:38.855737 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.855825 kubelet[2441]: W0517 00:37:38.855815 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.856016 kubelet[2441]: E0517 00:37:38.856000 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.856303 kubelet[2441]: E0517 00:37:38.856268 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.856484 kubelet[2441]: W0517 00:37:38.856468 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.856639 kubelet[2441]: E0517 00:37:38.856624 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.857126 kubelet[2441]: E0517 00:37:38.857089 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.857293 kubelet[2441]: W0517 00:37:38.857268 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.857532 kubelet[2441]: E0517 00:37:38.857516 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.857886 kubelet[2441]: E0517 00:37:38.857870 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.858008 kubelet[2441]: W0517 00:37:38.857993 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.858258 kubelet[2441]: E0517 00:37:38.858241 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.858544 kubelet[2441]: E0517 00:37:38.858530 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.858647 kubelet[2441]: W0517 00:37:38.858634 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.860784 kubelet[2441]: E0517 00:37:38.858815 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.861178 kubelet[2441]: E0517 00:37:38.861164 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.861284 kubelet[2441]: W0517 00:37:38.861270 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.861409 kubelet[2441]: E0517 00:37:38.861393 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.879097 kubelet[2441]: E0517 00:37:38.878272 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:38.879097 kubelet[2441]: W0517 00:37:38.878289 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:38.879097 kubelet[2441]: E0517 00:37:38.878306 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:38.871000 audit[2963]: NETFILTER_CFG table=filter:100 family=2 entries=20 op=nft_register_rule pid=2963 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:38.871000 audit[2963]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7fff80846c90 a2=0 a3=7fff80846c7c items=0 ppid=2549 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.871000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:38.885000 audit[2963]: NETFILTER_CFG table=nat:101 family=2 entries=12 op=nft_register_rule pid=2963 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:38.885000 audit[2963]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff80846c90 a2=0 a3=0 items=0 ppid=2549 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.885000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:38.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.892000 audit: BPF prog-id=126 op=LOAD May 17 00:37:38.893000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2916 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561626163636663633761313937396364376463326439353136623763 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2916 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561626163636663633761313937396364376463326439353136623763 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit: BPF prog-id=127 op=LOAD May 17 00:37:38.893000 audit[2924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030eec0 items=0 ppid=2916 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561626163636663633761313937396364376463326439353136623763 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit: BPF prog-id=128 op=LOAD May 17 00:37:38.893000 audit[2924]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030ef08 items=0 ppid=2916 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561626163636663633761313937396364376463326439353136623763 May 17 00:37:38.893000 audit: BPF prog-id=128 op=UNLOAD May 17 00:37:38.893000 audit: BPF prog-id=127 op=UNLOAD May 17 00:37:38.893000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:38.893000 audit: BPF prog-id=129 op=LOAD May 17 00:37:38.893000 audit[2924]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030f318 items=0 ppid=2916 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:38.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561626163636663633761313937396364376463326439353136623763 May 17 00:37:38.907624 env[1439]: time="2025-05-17T00:37:38.907568949Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-m6z75,Uid:75d56078-bcf8-4f15-8b4f-d6e349514b2d,Namespace:calico-system,Attempt:0,} returns sandbox id \"5abaccfcc7a1979cd7dc2d9516b7c2bf3f0d7eee839d17ac8135800d42c12b9a\"" May 17 00:37:39.244009 systemd[1]: run-containerd-runc-k8s.io-89b688d3778ab0f72ceebe1ff1d296cf0a3acfb8a95db9e43e1846ba7d183c12-runc.cfzKHf.mount: Deactivated successfully. May 17 00:37:39.759018 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1863243554.mount: Deactivated successfully. May 17 00:37:40.847312 env[1439]: time="2025-05-17T00:37:40.847264658Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:40.853436 env[1439]: time="2025-05-17T00:37:40.853393520Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:40.857181 env[1439]: time="2025-05-17T00:37:40.857149396Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:40.860832 env[1439]: time="2025-05-17T00:37:40.860798573Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:40.861292 env[1439]: time="2025-05-17T00:37:40.861260671Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\" returns image reference \"sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be\"" May 17 00:37:40.863134 env[1439]: time="2025-05-17T00:37:40.862682362Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:37:40.872177 env[1439]: time="2025-05-17T00:37:40.872139203Z" level=info msg="CreateContainer within sandbox \"89b688d3778ab0f72ceebe1ff1d296cf0a3acfb8a95db9e43e1846ba7d183c12\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 17 00:37:40.912457 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2034685821.mount: Deactivated successfully. May 17 00:37:40.931714 env[1439]: time="2025-05-17T00:37:40.931665831Z" level=info msg="CreateContainer within sandbox \"89b688d3778ab0f72ceebe1ff1d296cf0a3acfb8a95db9e43e1846ba7d183c12\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"6f9e6a493721fa58547adf12ac1d7749fc5e8747254075001a17a5f7330afafc\"" May 17 00:37:40.933635 env[1439]: time="2025-05-17T00:37:40.932383827Z" level=info msg="StartContainer for \"6f9e6a493721fa58547adf12ac1d7749fc5e8747254075001a17a5f7330afafc\"" May 17 00:37:40.954726 systemd[1]: Started cri-containerd-6f9e6a493721fa58547adf12ac1d7749fc5e8747254075001a17a5f7330afafc.scope. May 17 00:37:40.986624 kernel: kauditd_printk_skb: 139 callbacks suppressed May 17 00:37:40.986753 kernel: audit: type=1400 audit(1747442260.969:956): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.999251 kernel: audit: type=1400 audit(1747442260.969:957): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.999499 kubelet[2441]: E0517 00:37:40.990161 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fccc4" podUID="ebc6cbc0-e584-4665-8b37-7cb92cbebceb" May 17 00:37:40.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.028824 kernel: audit: type=1400 audit(1747442260.969:958): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.028926 kernel: audit: type=1400 audit(1747442260.969:959): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.047398 kernel: audit: type=1400 audit(1747442260.969:960): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.064462 kernel: audit: type=1400 audit(1747442260.969:961): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.078555 kernel: audit: type=1400 audit(1747442260.969:962): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.091534 env[1439]: time="2025-05-17T00:37:41.078659126Z" level=info msg="StartContainer for \"6f9e6a493721fa58547adf12ac1d7749fc5e8747254075001a17a5f7330afafc\" returns successfully" May 17 00:37:41.104215 kernel: audit: type=1400 audit(1747442260.969:963): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.104329 kernel: audit: type=1400 audit(1747442260.969:964): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.974000 audit: BPF prog-id=130 op=LOAD May 17 00:37:40.974000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:41.119365 kernel: audit: type=1400 audit(1747442260.974:965): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.974000 audit[2991]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2838 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666396536613439333732316661353835343761646631326163316437 May 17 00:37:40.974000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.974000 audit[2991]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2838 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666396536613439333732316661353835343761646631326163316437 May 17 00:37:40.974000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.974000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.974000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.974000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.974000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.974000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.974000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.974000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.974000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.974000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.974000 audit: BPF prog-id=131 op=LOAD May 17 00:37:40.974000 audit[2991]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003091d0 items=0 ppid=2838 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666396536613439333732316661353835343761646631326163316437 May 17 00:37:40.986000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.986000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.986000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.986000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.986000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.986000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.986000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.986000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.986000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.986000 audit: BPF prog-id=132 op=LOAD May 17 00:37:40.986000 audit[2991]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000309218 items=0 ppid=2838 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666396536613439333732316661353835343761646631326163316437 May 17 00:37:40.986000 audit: BPF prog-id=132 op=UNLOAD May 17 00:37:40.986000 audit: BPF prog-id=131 op=UNLOAD May 17 00:37:40.986000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.986000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.986000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.986000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.986000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.986000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.986000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.986000 audit[2991]: AVC avc: denied { perfmon } for pid=2991 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.986000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.986000 audit[2991]: AVC avc: denied { bpf } for pid=2991 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:40.986000 audit: BPF prog-id=133 op=LOAD May 17 00:37:40.986000 audit[2991]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000309628 items=0 ppid=2838 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666396536613439333732316661353835343761646631326163316437 May 17 00:37:42.098824 env[1439]: time="2025-05-17T00:37:42.098764531Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:42.105943 env[1439]: time="2025-05-17T00:37:42.105901989Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:42.110247 env[1439]: time="2025-05-17T00:37:42.110215163Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:42.115541 env[1439]: time="2025-05-17T00:37:42.115505532Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:42.116057 env[1439]: time="2025-05-17T00:37:42.115925529Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:37:42.119231 env[1439]: time="2025-05-17T00:37:42.119195110Z" level=info msg="CreateContainer within sandbox \"5abaccfcc7a1979cd7dc2d9516b7c2bf3f0d7eee839d17ac8135800d42c12b9a\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:37:42.156969 kubelet[2441]: E0517 00:37:42.156774 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.156969 kubelet[2441]: W0517 00:37:42.156806 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.156969 kubelet[2441]: E0517 00:37:42.156833 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.157798 kubelet[2441]: E0517 00:37:42.157624 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.157798 kubelet[2441]: W0517 00:37:42.157644 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.157798 kubelet[2441]: E0517 00:37:42.157662 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.158935 kubelet[2441]: E0517 00:37:42.158121 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.158935 kubelet[2441]: W0517 00:37:42.158137 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.158935 kubelet[2441]: E0517 00:37:42.158154 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.158935 kubelet[2441]: E0517 00:37:42.158795 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.158935 kubelet[2441]: W0517 00:37:42.158806 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.158935 kubelet[2441]: E0517 00:37:42.158818 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.159230 env[1439]: time="2025-05-17T00:37:42.158131679Z" level=info msg="CreateContainer within sandbox \"5abaccfcc7a1979cd7dc2d9516b7c2bf3f0d7eee839d17ac8135800d42c12b9a\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"9cf4a34043adbd7c1aaa316197a29680d678ccb5d982bc0c7f1b570559e2f018\"" May 17 00:37:42.159378 kubelet[2441]: E0517 00:37:42.159334 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.159378 kubelet[2441]: W0517 00:37:42.159374 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.159541 kubelet[2441]: E0517 00:37:42.159394 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.159723 env[1439]: time="2025-05-17T00:37:42.159685870Z" level=info msg="StartContainer for \"9cf4a34043adbd7c1aaa316197a29680d678ccb5d982bc0c7f1b570559e2f018\"" May 17 00:37:42.160489 kubelet[2441]: E0517 00:37:42.160454 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.160622 kubelet[2441]: W0517 00:37:42.160607 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.160744 kubelet[2441]: E0517 00:37:42.160729 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.161103 kubelet[2441]: E0517 00:37:42.161086 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.161225 kubelet[2441]: W0517 00:37:42.161212 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.161324 kubelet[2441]: E0517 00:37:42.161308 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.161806 kubelet[2441]: E0517 00:37:42.161782 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.161925 kubelet[2441]: W0517 00:37:42.161909 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.162030 kubelet[2441]: E0517 00:37:42.162011 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.164528 kubelet[2441]: E0517 00:37:42.164512 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.164638 kubelet[2441]: W0517 00:37:42.164624 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.164720 kubelet[2441]: E0517 00:37:42.164707 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.165004 kubelet[2441]: E0517 00:37:42.164990 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.165132 kubelet[2441]: W0517 00:37:42.165117 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.165241 kubelet[2441]: E0517 00:37:42.165226 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.167435 kubelet[2441]: E0517 00:37:42.167418 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.167559 kubelet[2441]: W0517 00:37:42.167543 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.167676 kubelet[2441]: E0517 00:37:42.167663 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.167985 kubelet[2441]: E0517 00:37:42.167967 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.167985 kubelet[2441]: W0517 00:37:42.167984 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.168131 kubelet[2441]: E0517 00:37:42.167998 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.168209 kubelet[2441]: E0517 00:37:42.168195 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.168257 kubelet[2441]: W0517 00:37:42.168210 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.168257 kubelet[2441]: E0517 00:37:42.168224 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.168453 kubelet[2441]: E0517 00:37:42.168439 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.168522 kubelet[2441]: W0517 00:37:42.168454 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.168522 kubelet[2441]: E0517 00:37:42.168467 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.168660 kubelet[2441]: E0517 00:37:42.168646 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.168716 kubelet[2441]: W0517 00:37:42.168662 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.168716 kubelet[2441]: E0517 00:37:42.168675 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.169063 kubelet[2441]: E0517 00:37:42.169045 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.169063 kubelet[2441]: W0517 00:37:42.169062 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.169184 kubelet[2441]: E0517 00:37:42.169078 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.169366 kubelet[2441]: E0517 00:37:42.169323 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.169366 kubelet[2441]: W0517 00:37:42.169353 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.169482 kubelet[2441]: E0517 00:37:42.169373 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.170065 kubelet[2441]: E0517 00:37:42.170044 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.170147 kubelet[2441]: W0517 00:37:42.170087 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.170147 kubelet[2441]: E0517 00:37:42.170108 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.171863 kubelet[2441]: E0517 00:37:42.170593 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.171863 kubelet[2441]: W0517 00:37:42.170607 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.171863 kubelet[2441]: E0517 00:37:42.170714 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.171863 kubelet[2441]: E0517 00:37:42.170923 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.171863 kubelet[2441]: W0517 00:37:42.170934 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.171863 kubelet[2441]: E0517 00:37:42.171019 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.174476 kubelet[2441]: E0517 00:37:42.174456 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.174476 kubelet[2441]: W0517 00:37:42.174478 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.174625 kubelet[2441]: E0517 00:37:42.174573 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.174720 kubelet[2441]: E0517 00:37:42.174701 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.174720 kubelet[2441]: W0517 00:37:42.174717 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.174817 kubelet[2441]: E0517 00:37:42.174802 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.174934 kubelet[2441]: E0517 00:37:42.174917 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.174999 kubelet[2441]: W0517 00:37:42.174934 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.175062 kubelet[2441]: E0517 00:37:42.175013 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.175143 kubelet[2441]: E0517 00:37:42.175129 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.175194 kubelet[2441]: W0517 00:37:42.175144 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.175194 kubelet[2441]: E0517 00:37:42.175161 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.175399 kubelet[2441]: E0517 00:37:42.175381 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.175399 kubelet[2441]: W0517 00:37:42.175398 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.175518 kubelet[2441]: E0517 00:37:42.175415 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.175660 kubelet[2441]: E0517 00:37:42.175646 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.175720 kubelet[2441]: W0517 00:37:42.175663 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.175720 kubelet[2441]: E0517 00:37:42.175680 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.176780 kubelet[2441]: E0517 00:37:42.176760 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.176780 kubelet[2441]: W0517 00:37:42.176778 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.176932 kubelet[2441]: E0517 00:37:42.176865 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.177038 kubelet[2441]: E0517 00:37:42.177023 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.177097 kubelet[2441]: W0517 00:37:42.177039 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.177142 kubelet[2441]: E0517 00:37:42.177123 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.177260 kubelet[2441]: E0517 00:37:42.177246 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.177319 kubelet[2441]: W0517 00:37:42.177261 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.177319 kubelet[2441]: E0517 00:37:42.177276 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.177543 kubelet[2441]: E0517 00:37:42.177528 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.177605 kubelet[2441]: W0517 00:37:42.177545 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.177605 kubelet[2441]: E0517 00:37:42.177562 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.178131 kubelet[2441]: E0517 00:37:42.178114 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.178131 kubelet[2441]: W0517 00:37:42.178130 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.178282 kubelet[2441]: E0517 00:37:42.178147 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.180368 kubelet[2441]: E0517 00:37:42.178380 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.180368 kubelet[2441]: W0517 00:37:42.178394 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.180368 kubelet[2441]: E0517 00:37:42.178407 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.180368 kubelet[2441]: E0517 00:37:42.178742 2441 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:42.180368 kubelet[2441]: W0517 00:37:42.178754 2441 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:42.180368 kubelet[2441]: E0517 00:37:42.178768 2441 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:42.213514 systemd[1]: Started cri-containerd-9cf4a34043adbd7c1aaa316197a29680d678ccb5d982bc0c7f1b570559e2f018.scope. May 17 00:37:42.222423 systemd[1]: run-containerd-runc-k8s.io-9cf4a34043adbd7c1aaa316197a29680d678ccb5d982bc0c7f1b570559e2f018-runc.4dqioL.mount: Deactivated successfully. May 17 00:37:42.260000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.260000 audit[3061]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f4e5d132cc8 items=0 ppid=2916 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:42.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963663461333430343361646264376331616161333136313937613239 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit: BPF prog-id=134 op=LOAD May 17 00:37:42.261000 audit[3061]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00027bc58 items=0 ppid=2916 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:42.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963663461333430343361646264376331616161333136313937613239 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit: BPF prog-id=135 op=LOAD May 17 00:37:42.261000 audit[3061]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00027bca8 items=0 ppid=2916 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:42.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963663461333430343361646264376331616161333136313937613239 May 17 00:37:42.261000 audit: BPF prog-id=135 op=UNLOAD May 17 00:37:42.261000 audit: BPF prog-id=134 op=UNLOAD May 17 00:37:42.261000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:42.261000 audit: BPF prog-id=136 op=LOAD May 17 00:37:42.261000 audit[3061]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00027bd38 items=0 ppid=2916 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:42.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963663461333430343361646264376331616161333136313937613239 May 17 00:37:42.289701 env[1439]: time="2025-05-17T00:37:42.289625498Z" level=info msg="StartContainer for \"9cf4a34043adbd7c1aaa316197a29680d678ccb5d982bc0c7f1b570559e2f018\" returns successfully" May 17 00:37:42.297622 systemd[1]: cri-containerd-9cf4a34043adbd7c1aaa316197a29680d678ccb5d982bc0c7f1b570559e2f018.scope: Deactivated successfully. May 17 00:37:42.301000 audit: BPF prog-id=136 op=UNLOAD May 17 00:37:42.868397 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9cf4a34043adbd7c1aaa316197a29680d678ccb5d982bc0c7f1b570559e2f018-rootfs.mount: Deactivated successfully. May 17 00:37:43.024910 kubelet[2441]: E0517 00:37:42.990749 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fccc4" podUID="ebc6cbc0-e584-4665-8b37-7cb92cbebceb" May 17 00:37:43.087414 kubelet[2441]: I0517 00:37:43.087380 2441 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:37:43.103991 kubelet[2441]: I0517 00:37:43.103936 2441 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-d944878fb-k4qtr" podStartSLOduration=2.7350013779999998 podStartE2EDuration="5.103916177s" podCreationTimestamp="2025-05-17 00:37:38 +0000 UTC" firstStartedPulling="2025-05-17 00:37:38.493584264 +0000 UTC m=+21.595376285" lastFinishedPulling="2025-05-17 00:37:40.862498963 +0000 UTC m=+23.964291084" observedRunningTime="2025-05-17 00:37:42.112189052 +0000 UTC m=+25.213981073" watchObservedRunningTime="2025-05-17 00:37:43.103916177 +0000 UTC m=+26.205708198" May 17 00:37:43.786921 env[1439]: time="2025-05-17T00:37:43.786872719Z" level=info msg="shim disconnected" id=9cf4a34043adbd7c1aaa316197a29680d678ccb5d982bc0c7f1b570559e2f018 May 17 00:37:43.786921 env[1439]: time="2025-05-17T00:37:43.786917718Z" level=warning msg="cleaning up after shim disconnected" id=9cf4a34043adbd7c1aaa316197a29680d678ccb5d982bc0c7f1b570559e2f018 namespace=k8s.io May 17 00:37:43.787465 env[1439]: time="2025-05-17T00:37:43.786929218Z" level=info msg="cleaning up dead shim" May 17 00:37:43.796030 env[1439]: time="2025-05-17T00:37:43.795776967Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:37:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3104 runtime=io.containerd.runc.v2\n" May 17 00:37:44.091676 env[1439]: time="2025-05-17T00:37:44.091533366Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:37:44.142102 kubelet[2441]: I0517 00:37:44.142070 2441 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:37:44.180000 audit[3118]: NETFILTER_CFG table=filter:102 family=2 entries=21 op=nft_register_rule pid=3118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:44.180000 audit[3118]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffd6a649430 a2=0 a3=7ffd6a64941c items=0 ppid=2549 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:44.180000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:44.184000 audit[3118]: NETFILTER_CFG table=nat:103 family=2 entries=19 op=nft_register_chain pid=3118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:44.184000 audit[3118]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd6a649430 a2=0 a3=7ffd6a64941c items=0 ppid=2549 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:44.184000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:44.990151 kubelet[2441]: E0517 00:37:44.990104 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fccc4" podUID="ebc6cbc0-e584-4665-8b37-7cb92cbebceb" May 17 00:37:46.991669 kubelet[2441]: E0517 00:37:46.991625 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fccc4" podUID="ebc6cbc0-e584-4665-8b37-7cb92cbebceb" May 17 00:37:47.516620 env[1439]: time="2025-05-17T00:37:47.516564093Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:47.524957 env[1439]: time="2025-05-17T00:37:47.524915049Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:47.529350 env[1439]: time="2025-05-17T00:37:47.529309926Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:47.533378 env[1439]: time="2025-05-17T00:37:47.533330304Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:47.533798 env[1439]: time="2025-05-17T00:37:47.533768302Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:37:47.537293 env[1439]: time="2025-05-17T00:37:47.537267484Z" level=info msg="CreateContainer within sandbox \"5abaccfcc7a1979cd7dc2d9516b7c2bf3f0d7eee839d17ac8135800d42c12b9a\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:37:47.570552 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3443910661.mount: Deactivated successfully. May 17 00:37:47.590906 env[1439]: time="2025-05-17T00:37:47.590868301Z" level=info msg="CreateContainer within sandbox \"5abaccfcc7a1979cd7dc2d9516b7c2bf3f0d7eee839d17ac8135800d42c12b9a\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"627506dfdf0e4b0af7164fb92b2a17927598448fbb91eab0fc24a7884477247e\"" May 17 00:37:47.592606 env[1439]: time="2025-05-17T00:37:47.591462298Z" level=info msg="StartContainer for \"627506dfdf0e4b0af7164fb92b2a17927598448fbb91eab0fc24a7884477247e\"" May 17 00:37:47.624672 systemd[1]: run-containerd-runc-k8s.io-627506dfdf0e4b0af7164fb92b2a17927598448fbb91eab0fc24a7884477247e-runc.V18pRj.mount: Deactivated successfully. May 17 00:37:47.638333 systemd[1]: Started cri-containerd-627506dfdf0e4b0af7164fb92b2a17927598448fbb91eab0fc24a7884477247e.scope. May 17 00:37:47.671398 kernel: kauditd_printk_skb: 97 callbacks suppressed May 17 00:37:47.671549 kernel: audit: type=1400 audit(1747442267.654:983): avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.654000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.654000 audit[3127]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f9cd01422e8 items=0 ppid=2916 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:47.689271 kernel: audit: type=1300 audit(1747442267.654:983): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f9cd01422e8 items=0 ppid=2916 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:47.689622 kernel: audit: type=1327 audit(1747442267.654:983): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632373530366466646630653462306166373136346662393262326131 May 17 00:37:47.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632373530366466646630653462306166373136346662393262326131 May 17 00:37:47.654000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.720361 kernel: audit: type=1400 audit(1747442267.654:984): avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.654000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.745411 kernel: audit: type=1400 audit(1747442267.654:984): avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.745507 kernel: audit: type=1400 audit(1747442267.654:984): avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.654000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.654000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.758060 kernel: audit: type=1400 audit(1747442267.654:984): avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.758438 env[1439]: time="2025-05-17T00:37:47.758383719Z" level=info msg="StartContainer for \"627506dfdf0e4b0af7164fb92b2a17927598448fbb91eab0fc24a7884477247e\" returns successfully" May 17 00:37:47.654000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.771372 kernel: audit: type=1400 audit(1747442267.654:984): avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.654000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.654000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.796634 kernel: audit: type=1400 audit(1747442267.654:984): avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.796709 kernel: audit: type=1400 audit(1747442267.654:984): avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.654000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.654000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.654000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.654000 audit: BPF prog-id=137 op=LOAD May 17 00:37:47.654000 audit[3127]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c4068 items=0 ppid=2916 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:47.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632373530366466646630653462306166373136346662393262326131 May 17 00:37:47.671000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.671000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.671000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.671000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.671000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.671000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.671000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.671000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.671000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.671000 audit: BPF prog-id=138 op=LOAD May 17 00:37:47.671000 audit[3127]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003c40b8 items=0 ppid=2916 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:47.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632373530366466646630653462306166373136346662393262326131 May 17 00:37:47.671000 audit: BPF prog-id=138 op=UNLOAD May 17 00:37:47.671000 audit: BPF prog-id=137 op=UNLOAD May 17 00:37:47.671000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.671000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.671000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.671000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.671000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.671000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.671000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.671000 audit[3127]: AVC avc: denied { perfmon } for pid=3127 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.671000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.671000 audit[3127]: AVC avc: denied { bpf } for pid=3127 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:47.671000 audit: BPF prog-id=139 op=LOAD May 17 00:37:47.671000 audit[3127]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003c4148 items=0 ppid=2916 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:47.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632373530366466646630653462306166373136346662393262326131 May 17 00:37:48.990444 kubelet[2441]: E0517 00:37:48.990372 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fccc4" podUID="ebc6cbc0-e584-4665-8b37-7cb92cbebceb" May 17 00:37:49.390360 env[1439]: time="2025-05-17T00:37:49.389942644Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:37:49.391975 systemd[1]: cri-containerd-627506dfdf0e4b0af7164fb92b2a17927598448fbb91eab0fc24a7884477247e.scope: Deactivated successfully. May 17 00:37:49.396000 audit: BPF prog-id=139 op=UNLOAD May 17 00:37:49.413148 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-627506dfdf0e4b0af7164fb92b2a17927598448fbb91eab0fc24a7884477247e-rootfs.mount: Deactivated successfully. May 17 00:37:49.466487 kubelet[2441]: I0517 00:37:49.466450 2441 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 17 00:37:50.029105 kubelet[2441]: I0517 00:37:49.521596 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4-whisker-ca-bundle\") pod \"whisker-56455d8897-p8lqr\" (UID: \"ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4\") " pod="calico-system/whisker-56455d8897-p8lqr" May 17 00:37:50.029105 kubelet[2441]: I0517 00:37:49.521644 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/30df0e77-1e34-4685-80e6-9457028d7acb-calico-apiserver-certs\") pod \"calico-apiserver-74bc7c86ff-lcldf\" (UID: \"30df0e77-1e34-4685-80e6-9457028d7acb\") " pod="calico-apiserver/calico-apiserver-74bc7c86ff-lcldf" May 17 00:37:50.029105 kubelet[2441]: I0517 00:37:49.521670 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lbxl6\" (UniqueName: \"kubernetes.io/projected/30df0e77-1e34-4685-80e6-9457028d7acb-kube-api-access-lbxl6\") pod \"calico-apiserver-74bc7c86ff-lcldf\" (UID: \"30df0e77-1e34-4685-80e6-9457028d7acb\") " pod="calico-apiserver/calico-apiserver-74bc7c86ff-lcldf" May 17 00:37:50.029105 kubelet[2441]: I0517 00:37:49.521695 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4-whisker-backend-key-pair\") pod \"whisker-56455d8897-p8lqr\" (UID: \"ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4\") " pod="calico-system/whisker-56455d8897-p8lqr" May 17 00:37:50.029105 kubelet[2441]: I0517 00:37:49.521720 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-54rvf\" (UniqueName: \"kubernetes.io/projected/ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4-kube-api-access-54rvf\") pod \"whisker-56455d8897-p8lqr\" (UID: \"ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4\") " pod="calico-system/whisker-56455d8897-p8lqr" May 17 00:37:49.505646 systemd[1]: Created slice kubepods-besteffort-pod30df0e77_1e34_4685_80e6_9457028d7acb.slice. May 17 00:37:50.030272 kubelet[2441]: I0517 00:37:49.622529 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/68e18fcd-7ed4-4596-bb1d-407a2a0928fe-goldmane-ca-bundle\") pod \"goldmane-78d55f7ddc-zjc4h\" (UID: \"68e18fcd-7ed4-4596-bb1d-407a2a0928fe\") " pod="calico-system/goldmane-78d55f7ddc-zjc4h" May 17 00:37:50.030272 kubelet[2441]: I0517 00:37:49.622576 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f7311dad-530c-4ead-87b1-cc9be9e8f9e6-calico-apiserver-certs\") pod \"calico-apiserver-74bc7c86ff-rst5w\" (UID: \"f7311dad-530c-4ead-87b1-cc9be9e8f9e6\") " pod="calico-apiserver/calico-apiserver-74bc7c86ff-rst5w" May 17 00:37:50.030272 kubelet[2441]: I0517 00:37:49.622604 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/68e18fcd-7ed4-4596-bb1d-407a2a0928fe-goldmane-key-pair\") pod \"goldmane-78d55f7ddc-zjc4h\" (UID: \"68e18fcd-7ed4-4596-bb1d-407a2a0928fe\") " pod="calico-system/goldmane-78d55f7ddc-zjc4h" May 17 00:37:50.030272 kubelet[2441]: I0517 00:37:49.622628 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qpkvj\" (UniqueName: \"kubernetes.io/projected/8dfb2f5b-365c-4be9-abc4-56ee0d856953-kube-api-access-qpkvj\") pod \"coredns-668d6bf9bc-z2hcl\" (UID: \"8dfb2f5b-365c-4be9-abc4-56ee0d856953\") " pod="kube-system/coredns-668d6bf9bc-z2hcl" May 17 00:37:50.030272 kubelet[2441]: I0517 00:37:49.622670 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8r4bq\" (UniqueName: \"kubernetes.io/projected/68e18fcd-7ed4-4596-bb1d-407a2a0928fe-kube-api-access-8r4bq\") pod \"goldmane-78d55f7ddc-zjc4h\" (UID: \"68e18fcd-7ed4-4596-bb1d-407a2a0928fe\") " pod="calico-system/goldmane-78d55f7ddc-zjc4h" May 17 00:37:49.524561 systemd[1]: Created slice kubepods-besteffort-podba6b90d9_f691_4be8_9c7c_2cdfd4d1c7a4.slice. May 17 00:37:50.030682 kubelet[2441]: I0517 00:37:49.622702 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0275e303-b9b6-4751-bc08-2a8efdaebb11-tigera-ca-bundle\") pod \"calico-kube-controllers-695b995796-2gnrg\" (UID: \"0275e303-b9b6-4751-bc08-2a8efdaebb11\") " pod="calico-system/calico-kube-controllers-695b995796-2gnrg" May 17 00:37:50.030682 kubelet[2441]: I0517 00:37:49.622717 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/8dfb2f5b-365c-4be9-abc4-56ee0d856953-config-volume\") pod \"coredns-668d6bf9bc-z2hcl\" (UID: \"8dfb2f5b-365c-4be9-abc4-56ee0d856953\") " pod="kube-system/coredns-668d6bf9bc-z2hcl" May 17 00:37:50.030682 kubelet[2441]: I0517 00:37:49.622739 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kdlvh\" (UniqueName: \"kubernetes.io/projected/0275e303-b9b6-4751-bc08-2a8efdaebb11-kube-api-access-kdlvh\") pod \"calico-kube-controllers-695b995796-2gnrg\" (UID: \"0275e303-b9b6-4751-bc08-2a8efdaebb11\") " pod="calico-system/calico-kube-controllers-695b995796-2gnrg" May 17 00:37:50.030682 kubelet[2441]: I0517 00:37:49.622756 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/4e44aa06-40b1-4eaf-95c2-202522049069-calico-apiserver-certs\") pod \"calico-apiserver-74d588d884-vsm27\" (UID: \"4e44aa06-40b1-4eaf-95c2-202522049069\") " pod="calico-apiserver/calico-apiserver-74d588d884-vsm27" May 17 00:37:50.030682 kubelet[2441]: I0517 00:37:49.622771 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hvctx\" (UniqueName: \"kubernetes.io/projected/1bd08ff5-79c3-4229-a51c-edcb14417442-kube-api-access-hvctx\") pod \"coredns-668d6bf9bc-jjw7b\" (UID: \"1bd08ff5-79c3-4229-a51c-edcb14417442\") " pod="kube-system/coredns-668d6bf9bc-jjw7b" May 17 00:37:49.537563 systemd[1]: Created slice kubepods-besteffort-podf7311dad_530c_4ead_87b1_cc9be9e8f9e6.slice. May 17 00:37:50.031038 kubelet[2441]: I0517 00:37:49.622798 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/1bd08ff5-79c3-4229-a51c-edcb14417442-config-volume\") pod \"coredns-668d6bf9bc-jjw7b\" (UID: \"1bd08ff5-79c3-4229-a51c-edcb14417442\") " pod="kube-system/coredns-668d6bf9bc-jjw7b" May 17 00:37:50.031038 kubelet[2441]: I0517 00:37:49.622820 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6qz85\" (UniqueName: \"kubernetes.io/projected/4e44aa06-40b1-4eaf-95c2-202522049069-kube-api-access-6qz85\") pod \"calico-apiserver-74d588d884-vsm27\" (UID: \"4e44aa06-40b1-4eaf-95c2-202522049069\") " pod="calico-apiserver/calico-apiserver-74d588d884-vsm27" May 17 00:37:50.031038 kubelet[2441]: I0517 00:37:49.622841 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cq4ln\" (UniqueName: \"kubernetes.io/projected/f7311dad-530c-4ead-87b1-cc9be9e8f9e6-kube-api-access-cq4ln\") pod \"calico-apiserver-74bc7c86ff-rst5w\" (UID: \"f7311dad-530c-4ead-87b1-cc9be9e8f9e6\") " pod="calico-apiserver/calico-apiserver-74bc7c86ff-rst5w" May 17 00:37:50.031038 kubelet[2441]: I0517 00:37:49.622871 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/68e18fcd-7ed4-4596-bb1d-407a2a0928fe-config\") pod \"goldmane-78d55f7ddc-zjc4h\" (UID: \"68e18fcd-7ed4-4596-bb1d-407a2a0928fe\") " pod="calico-system/goldmane-78d55f7ddc-zjc4h" May 17 00:37:49.549630 systemd[1]: Created slice kubepods-burstable-pod8dfb2f5b_365c_4be9_abc4_56ee0d856953.slice. May 17 00:37:49.556834 systemd[1]: Created slice kubepods-burstable-pod1bd08ff5_79c3_4229_a51c_edcb14417442.slice. May 17 00:37:49.567103 systemd[1]: Created slice kubepods-besteffort-pod0275e303_b9b6_4751_bc08_2a8efdaebb11.slice. May 17 00:37:49.575156 systemd[1]: Created slice kubepods-besteffort-pod68e18fcd_7ed4_4596_bb1d_407a2a0928fe.slice. May 17 00:37:49.582621 systemd[1]: Created slice kubepods-besteffort-pod4e44aa06_40b1_4eaf_95c2_202522049069.slice. May 17 00:37:50.324531 env[1439]: time="2025-05-17T00:37:50.324403786Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74bc7c86ff-lcldf,Uid:30df0e77-1e34-4685-80e6-9457028d7acb,Namespace:calico-apiserver,Attempt:0,}" May 17 00:37:50.329496 env[1439]: time="2025-05-17T00:37:50.329239562Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74bc7c86ff-rst5w,Uid:f7311dad-530c-4ead-87b1-cc9be9e8f9e6,Namespace:calico-apiserver,Attempt:0,}" May 17 00:37:50.329496 env[1439]: time="2025-05-17T00:37:50.329354161Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-jjw7b,Uid:1bd08ff5-79c3-4229-a51c-edcb14417442,Namespace:kube-system,Attempt:0,}" May 17 00:37:50.348554 env[1439]: time="2025-05-17T00:37:50.348501767Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-695b995796-2gnrg,Uid:0275e303-b9b6-4751-bc08-2a8efdaebb11,Namespace:calico-system,Attempt:0,}" May 17 00:37:50.348888 env[1439]: time="2025-05-17T00:37:50.348853266Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-56455d8897-p8lqr,Uid:ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4,Namespace:calico-system,Attempt:0,}" May 17 00:37:50.349102 env[1439]: time="2025-05-17T00:37:50.349073765Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-z2hcl,Uid:8dfb2f5b-365c-4be9-abc4-56ee0d856953,Namespace:kube-system,Attempt:0,}" May 17 00:37:50.366597 env[1439]: time="2025-05-17T00:37:50.366549579Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-zjc4h,Uid:68e18fcd-7ed4-4596-bb1d-407a2a0928fe,Namespace:calico-system,Attempt:0,}" May 17 00:37:50.379207 env[1439]: time="2025-05-17T00:37:50.379134917Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74d588d884-vsm27,Uid:4e44aa06-40b1-4eaf-95c2-202522049069,Namespace:calico-apiserver,Attempt:0,}" May 17 00:37:50.672125 env[1439]: time="2025-05-17T00:37:50.672068679Z" level=info msg="shim disconnected" id=627506dfdf0e4b0af7164fb92b2a17927598448fbb91eab0fc24a7884477247e May 17 00:37:50.672125 env[1439]: time="2025-05-17T00:37:50.672131178Z" level=warning msg="cleaning up after shim disconnected" id=627506dfdf0e4b0af7164fb92b2a17927598448fbb91eab0fc24a7884477247e namespace=k8s.io May 17 00:37:50.672656 env[1439]: time="2025-05-17T00:37:50.672144578Z" level=info msg="cleaning up dead shim" May 17 00:37:50.680674 env[1439]: time="2025-05-17T00:37:50.680634737Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:37:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3204 runtime=io.containerd.runc.v2\n" May 17 00:37:50.997728 systemd[1]: Created slice kubepods-besteffort-podebc6cbc0_e584_4665_8b37_7cb92cbebceb.slice. May 17 00:37:51.010736 env[1439]: time="2025-05-17T00:37:51.010691917Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fccc4,Uid:ebc6cbc0-e584-4665-8b37-7cb92cbebceb,Namespace:calico-system,Attempt:0,}" May 17 00:37:51.110876 env[1439]: time="2025-05-17T00:37:51.110803837Z" level=error msg="Failed to destroy network for sandbox \"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.114548 env[1439]: time="2025-05-17T00:37:51.114497919Z" level=error msg="encountered an error cleaning up failed sandbox \"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.114767 env[1439]: time="2025-05-17T00:37:51.114722118Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74bc7c86ff-lcldf,Uid:30df0e77-1e34-4685-80e6-9457028d7acb,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.135034 env[1439]: time="2025-05-17T00:37:51.134995721Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:37:51.135576 kubelet[2441]: E0517 00:37:51.135539 2441 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.135942 kubelet[2441]: E0517 00:37:51.135664 2441 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-74bc7c86ff-lcldf" May 17 00:37:51.135942 kubelet[2441]: E0517 00:37:51.135711 2441 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-74bc7c86ff-lcldf" May 17 00:37:51.135942 kubelet[2441]: E0517 00:37:51.135784 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-74bc7c86ff-lcldf_calico-apiserver(30df0e77-1e34-4685-80e6-9457028d7acb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-74bc7c86ff-lcldf_calico-apiserver(30df0e77-1e34-4685-80e6-9457028d7acb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-74bc7c86ff-lcldf" podUID="30df0e77-1e34-4685-80e6-9457028d7acb" May 17 00:37:51.137081 env[1439]: time="2025-05-17T00:37:51.137039311Z" level=error msg="Failed to destroy network for sandbox \"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.140746 env[1439]: time="2025-05-17T00:37:51.140706593Z" level=error msg="encountered an error cleaning up failed sandbox \"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.140927 env[1439]: time="2025-05-17T00:37:51.140883392Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-jjw7b,Uid:1bd08ff5-79c3-4229-a51c-edcb14417442,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.141302 kubelet[2441]: E0517 00:37:51.141143 2441 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.141302 kubelet[2441]: E0517 00:37:51.141190 2441 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-jjw7b" May 17 00:37:51.141302 kubelet[2441]: E0517 00:37:51.141215 2441 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-jjw7b" May 17 00:37:51.141510 kubelet[2441]: E0517 00:37:51.141258 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-jjw7b_kube-system(1bd08ff5-79c3-4229-a51c-edcb14417442)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-jjw7b_kube-system(1bd08ff5-79c3-4229-a51c-edcb14417442)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-jjw7b" podUID="1bd08ff5-79c3-4229-a51c-edcb14417442" May 17 00:37:51.180914 env[1439]: time="2025-05-17T00:37:51.180856901Z" level=error msg="Failed to destroy network for sandbox \"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.184788 env[1439]: time="2025-05-17T00:37:51.184737882Z" level=error msg="encountered an error cleaning up failed sandbox \"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.185001 env[1439]: time="2025-05-17T00:37:51.184956881Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-56455d8897-p8lqr,Uid:ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.185695 kubelet[2441]: E0517 00:37:51.185647 2441 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.185817 kubelet[2441]: E0517 00:37:51.185742 2441 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-56455d8897-p8lqr" May 17 00:37:51.185817 kubelet[2441]: E0517 00:37:51.185787 2441 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-56455d8897-p8lqr" May 17 00:37:51.187923 kubelet[2441]: E0517 00:37:51.187875 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-56455d8897-p8lqr_calico-system(ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-56455d8897-p8lqr_calico-system(ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-56455d8897-p8lqr" podUID="ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4" May 17 00:37:51.215289 env[1439]: time="2025-05-17T00:37:51.215229936Z" level=error msg="Failed to destroy network for sandbox \"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.215662 env[1439]: time="2025-05-17T00:37:51.215615034Z" level=error msg="encountered an error cleaning up failed sandbox \"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.215757 env[1439]: time="2025-05-17T00:37:51.215688333Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74bc7c86ff-rst5w,Uid:f7311dad-530c-4ead-87b1-cc9be9e8f9e6,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.216357 kubelet[2441]: E0517 00:37:51.215919 2441 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.216357 kubelet[2441]: E0517 00:37:51.216008 2441 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-74bc7c86ff-rst5w" May 17 00:37:51.216357 kubelet[2441]: E0517 00:37:51.216037 2441 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-74bc7c86ff-rst5w" May 17 00:37:51.216559 kubelet[2441]: E0517 00:37:51.216092 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-74bc7c86ff-rst5w_calico-apiserver(f7311dad-530c-4ead-87b1-cc9be9e8f9e6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-74bc7c86ff-rst5w_calico-apiserver(f7311dad-530c-4ead-87b1-cc9be9e8f9e6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-74bc7c86ff-rst5w" podUID="f7311dad-530c-4ead-87b1-cc9be9e8f9e6" May 17 00:37:51.279579 env[1439]: time="2025-05-17T00:37:51.279441028Z" level=error msg="Failed to destroy network for sandbox \"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.281721 env[1439]: time="2025-05-17T00:37:51.281665917Z" level=error msg="encountered an error cleaning up failed sandbox \"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.281843 env[1439]: time="2025-05-17T00:37:51.281744916Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74d588d884-vsm27,Uid:4e44aa06-40b1-4eaf-95c2-202522049069,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.282071 kubelet[2441]: E0517 00:37:51.282003 2441 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.282156 kubelet[2441]: E0517 00:37:51.282102 2441 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-74d588d884-vsm27" May 17 00:37:51.282208 kubelet[2441]: E0517 00:37:51.282154 2441 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-74d588d884-vsm27" May 17 00:37:51.283962 kubelet[2441]: E0517 00:37:51.282240 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-74d588d884-vsm27_calico-apiserver(4e44aa06-40b1-4eaf-95c2-202522049069)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-74d588d884-vsm27_calico-apiserver(4e44aa06-40b1-4eaf-95c2-202522049069)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-74d588d884-vsm27" podUID="4e44aa06-40b1-4eaf-95c2-202522049069" May 17 00:37:51.284360 env[1439]: time="2025-05-17T00:37:51.284186705Z" level=error msg="Failed to destroy network for sandbox \"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.284850 env[1439]: time="2025-05-17T00:37:51.284809702Z" level=error msg="encountered an error cleaning up failed sandbox \"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.285028 env[1439]: time="2025-05-17T00:37:51.284983301Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-695b995796-2gnrg,Uid:0275e303-b9b6-4751-bc08-2a8efdaebb11,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.285385 kubelet[2441]: E0517 00:37:51.285334 2441 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.285474 kubelet[2441]: E0517 00:37:51.285405 2441 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-695b995796-2gnrg" May 17 00:37:51.285474 kubelet[2441]: E0517 00:37:51.285442 2441 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-695b995796-2gnrg" May 17 00:37:51.285577 kubelet[2441]: E0517 00:37:51.285488 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-695b995796-2gnrg_calico-system(0275e303-b9b6-4751-bc08-2a8efdaebb11)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-695b995796-2gnrg_calico-system(0275e303-b9b6-4751-bc08-2a8efdaebb11)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-695b995796-2gnrg" podUID="0275e303-b9b6-4751-bc08-2a8efdaebb11" May 17 00:37:51.298985 env[1439]: time="2025-05-17T00:37:51.298945134Z" level=error msg="Failed to destroy network for sandbox \"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.299426 env[1439]: time="2025-05-17T00:37:51.299387132Z" level=error msg="encountered an error cleaning up failed sandbox \"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.299606 env[1439]: time="2025-05-17T00:37:51.299563731Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-zjc4h,Uid:68e18fcd-7ed4-4596-bb1d-407a2a0928fe,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.299905 kubelet[2441]: E0517 00:37:51.299860 2441 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.299996 kubelet[2441]: E0517 00:37:51.299925 2441 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-zjc4h" May 17 00:37:51.299996 kubelet[2441]: E0517 00:37:51.299948 2441 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-zjc4h" May 17 00:37:51.300094 kubelet[2441]: E0517 00:37:51.300010 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-78d55f7ddc-zjc4h_calico-system(68e18fcd-7ed4-4596-bb1d-407a2a0928fe)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-78d55f7ddc-zjc4h_calico-system(68e18fcd-7ed4-4596-bb1d-407a2a0928fe)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-zjc4h" podUID="68e18fcd-7ed4-4596-bb1d-407a2a0928fe" May 17 00:37:51.303781 env[1439]: time="2025-05-17T00:37:51.303746611Z" level=error msg="Failed to destroy network for sandbox \"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.304211 env[1439]: time="2025-05-17T00:37:51.304171409Z" level=error msg="encountered an error cleaning up failed sandbox \"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.304384 env[1439]: time="2025-05-17T00:37:51.304332908Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-z2hcl,Uid:8dfb2f5b-365c-4be9-abc4-56ee0d856953,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.304737 kubelet[2441]: E0517 00:37:51.304703 2441 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.304822 kubelet[2441]: E0517 00:37:51.304771 2441 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-z2hcl" May 17 00:37:51.304892 kubelet[2441]: E0517 00:37:51.304826 2441 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-z2hcl" May 17 00:37:51.304943 kubelet[2441]: E0517 00:37:51.304892 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-z2hcl_kube-system(8dfb2f5b-365c-4be9-abc4-56ee0d856953)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-z2hcl_kube-system(8dfb2f5b-365c-4be9-abc4-56ee0d856953)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-z2hcl" podUID="8dfb2f5b-365c-4be9-abc4-56ee0d856953" May 17 00:37:51.324709 env[1439]: time="2025-05-17T00:37:51.324650111Z" level=error msg="Failed to destroy network for sandbox \"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.325039 env[1439]: time="2025-05-17T00:37:51.324997509Z" level=error msg="encountered an error cleaning up failed sandbox \"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.325139 env[1439]: time="2025-05-17T00:37:51.325063109Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fccc4,Uid:ebc6cbc0-e584-4665-8b37-7cb92cbebceb,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.325364 kubelet[2441]: E0517 00:37:51.325313 2441 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.325465 kubelet[2441]: E0517 00:37:51.325376 2441 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-fccc4" May 17 00:37:51.325465 kubelet[2441]: E0517 00:37:51.325400 2441 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-fccc4" May 17 00:37:51.325563 kubelet[2441]: E0517 00:37:51.325460 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-fccc4_calico-system(ebc6cbc0-e584-4665-8b37-7cb92cbebceb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-fccc4_calico-system(ebc6cbc0-e584-4665-8b37-7cb92cbebceb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-fccc4" podUID="ebc6cbc0-e584-4665-8b37-7cb92cbebceb" May 17 00:37:51.414355 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555-shm.mount: Deactivated successfully. May 17 00:37:51.414468 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d-shm.mount: Deactivated successfully. May 17 00:37:52.113601 kubelet[2441]: I0517 00:37:52.112910 2441 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" May 17 00:37:52.114089 env[1439]: time="2025-05-17T00:37:52.114040135Z" level=info msg="StopPodSandbox for \"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\"" May 17 00:37:52.115775 kubelet[2441]: I0517 00:37:52.115256 2441 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" May 17 00:37:52.116250 env[1439]: time="2025-05-17T00:37:52.116217424Z" level=info msg="StopPodSandbox for \"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\"" May 17 00:37:52.117713 kubelet[2441]: I0517 00:37:52.117416 2441 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" May 17 00:37:52.117958 env[1439]: time="2025-05-17T00:37:52.117926716Z" level=info msg="StopPodSandbox for \"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\"" May 17 00:37:52.119135 kubelet[2441]: I0517 00:37:52.119105 2441 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" May 17 00:37:52.119597 env[1439]: time="2025-05-17T00:37:52.119569209Z" level=info msg="StopPodSandbox for \"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\"" May 17 00:37:52.122087 kubelet[2441]: I0517 00:37:52.121726 2441 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" May 17 00:37:52.124093 env[1439]: time="2025-05-17T00:37:52.124066788Z" level=info msg="StopPodSandbox for \"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\"" May 17 00:37:52.126153 kubelet[2441]: I0517 00:37:52.125424 2441 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" May 17 00:37:52.128226 kubelet[2441]: I0517 00:37:52.127865 2441 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" May 17 00:37:52.129804 kubelet[2441]: I0517 00:37:52.129445 2441 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" May 17 00:37:52.131157 env[1439]: time="2025-05-17T00:37:52.126775975Z" level=info msg="StopPodSandbox for \"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\"" May 17 00:37:52.132354 env[1439]: time="2025-05-17T00:37:52.128479367Z" level=info msg="StopPodSandbox for \"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\"" May 17 00:37:52.132833 env[1439]: time="2025-05-17T00:37:52.130498457Z" level=info msg="StopPodSandbox for \"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\"" May 17 00:37:52.133756 kubelet[2441]: I0517 00:37:52.133589 2441 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" May 17 00:37:52.134206 env[1439]: time="2025-05-17T00:37:52.134175240Z" level=info msg="StopPodSandbox for \"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\"" May 17 00:37:52.228164 env[1439]: time="2025-05-17T00:37:52.228091300Z" level=error msg="StopPodSandbox for \"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\" failed" error="failed to destroy network for sandbox \"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:52.228465 kubelet[2441]: E0517 00:37:52.228398 2441 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" May 17 00:37:52.229245 kubelet[2441]: E0517 00:37:52.228516 2441 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157"} May 17 00:37:52.229245 kubelet[2441]: E0517 00:37:52.228609 2441 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0275e303-b9b6-4751-bc08-2a8efdaebb11\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:52.229245 kubelet[2441]: E0517 00:37:52.228642 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0275e303-b9b6-4751-bc08-2a8efdaebb11\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-695b995796-2gnrg" podUID="0275e303-b9b6-4751-bc08-2a8efdaebb11" May 17 00:37:52.305216 env[1439]: time="2025-05-17T00:37:52.305142338Z" level=error msg="StopPodSandbox for \"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\" failed" error="failed to destroy network for sandbox \"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:52.305641 kubelet[2441]: E0517 00:37:52.305583 2441 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" May 17 00:37:52.305778 kubelet[2441]: E0517 00:37:52.305658 2441 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555"} May 17 00:37:52.305778 kubelet[2441]: E0517 00:37:52.305718 2441 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f7311dad-530c-4ead-87b1-cc9be9e8f9e6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:52.305778 kubelet[2441]: E0517 00:37:52.305750 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f7311dad-530c-4ead-87b1-cc9be9e8f9e6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-74bc7c86ff-rst5w" podUID="f7311dad-530c-4ead-87b1-cc9be9e8f9e6" May 17 00:37:52.374614 env[1439]: time="2025-05-17T00:37:52.373087919Z" level=error msg="StopPodSandbox for \"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\" failed" error="failed to destroy network for sandbox \"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:52.374780 kubelet[2441]: E0517 00:37:52.374417 2441 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" May 17 00:37:52.374780 kubelet[2441]: E0517 00:37:52.374474 2441 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722"} May 17 00:37:52.374780 kubelet[2441]: E0517 00:37:52.374516 2441 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8dfb2f5b-365c-4be9-abc4-56ee0d856953\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:52.374780 kubelet[2441]: E0517 00:37:52.374554 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8dfb2f5b-365c-4be9-abc4-56ee0d856953\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-z2hcl" podUID="8dfb2f5b-365c-4be9-abc4-56ee0d856953" May 17 00:37:52.376844 env[1439]: time="2025-05-17T00:37:52.376797402Z" level=error msg="StopPodSandbox for \"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\" failed" error="failed to destroy network for sandbox \"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:52.377049 kubelet[2441]: E0517 00:37:52.377015 2441 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" May 17 00:37:52.377135 kubelet[2441]: E0517 00:37:52.377061 2441 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d"} May 17 00:37:52.377135 kubelet[2441]: E0517 00:37:52.377112 2441 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"30df0e77-1e34-4685-80e6-9457028d7acb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:52.377265 kubelet[2441]: E0517 00:37:52.377142 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"30df0e77-1e34-4685-80e6-9457028d7acb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-74bc7c86ff-lcldf" podUID="30df0e77-1e34-4685-80e6-9457028d7acb" May 17 00:37:52.384172 env[1439]: time="2025-05-17T00:37:52.384115468Z" level=error msg="StopPodSandbox for \"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\" failed" error="failed to destroy network for sandbox \"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:52.384386 kubelet[2441]: E0517 00:37:52.384322 2441 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" May 17 00:37:52.384503 kubelet[2441]: E0517 00:37:52.384390 2441 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8"} May 17 00:37:52.384503 kubelet[2441]: E0517 00:37:52.384442 2441 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4e44aa06-40b1-4eaf-95c2-202522049069\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:52.384503 kubelet[2441]: E0517 00:37:52.384470 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4e44aa06-40b1-4eaf-95c2-202522049069\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-74d588d884-vsm27" podUID="4e44aa06-40b1-4eaf-95c2-202522049069" May 17 00:37:52.386679 env[1439]: time="2025-05-17T00:37:52.386634356Z" level=error msg="StopPodSandbox for \"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\" failed" error="failed to destroy network for sandbox \"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:52.386991 kubelet[2441]: E0517 00:37:52.386943 2441 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" May 17 00:37:52.387093 kubelet[2441]: E0517 00:37:52.387002 2441 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5"} May 17 00:37:52.387093 kubelet[2441]: E0517 00:37:52.387047 2441 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ebc6cbc0-e584-4665-8b37-7cb92cbebceb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:52.387093 kubelet[2441]: E0517 00:37:52.387080 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ebc6cbc0-e584-4665-8b37-7cb92cbebceb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-fccc4" podUID="ebc6cbc0-e584-4665-8b37-7cb92cbebceb" May 17 00:37:52.388203 env[1439]: time="2025-05-17T00:37:52.388159749Z" level=error msg="StopPodSandbox for \"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\" failed" error="failed to destroy network for sandbox \"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:52.388408 kubelet[2441]: E0517 00:37:52.388336 2441 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" May 17 00:37:52.388491 kubelet[2441]: E0517 00:37:52.388417 2441 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb"} May 17 00:37:52.388491 kubelet[2441]: E0517 00:37:52.388467 2441 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1bd08ff5-79c3-4229-a51c-edcb14417442\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:52.388613 kubelet[2441]: E0517 00:37:52.388495 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1bd08ff5-79c3-4229-a51c-edcb14417442\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-jjw7b" podUID="1bd08ff5-79c3-4229-a51c-edcb14417442" May 17 00:37:52.396608 env[1439]: time="2025-05-17T00:37:52.396559709Z" level=error msg="StopPodSandbox for \"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\" failed" error="failed to destroy network for sandbox \"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:52.396773 kubelet[2441]: E0517 00:37:52.396731 2441 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" May 17 00:37:52.396852 kubelet[2441]: E0517 00:37:52.396782 2441 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46"} May 17 00:37:52.396852 kubelet[2441]: E0517 00:37:52.396815 2441 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:52.396982 kubelet[2441]: E0517 00:37:52.396844 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-56455d8897-p8lqr" podUID="ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4" May 17 00:37:52.402762 env[1439]: time="2025-05-17T00:37:52.402724980Z" level=error msg="StopPodSandbox for \"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\" failed" error="failed to destroy network for sandbox \"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:52.403030 kubelet[2441]: E0517 00:37:52.403003 2441 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" May 17 00:37:52.403196 kubelet[2441]: E0517 00:37:52.403041 2441 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd"} May 17 00:37:52.403196 kubelet[2441]: E0517 00:37:52.403072 2441 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"68e18fcd-7ed4-4596-bb1d-407a2a0928fe\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:52.403196 kubelet[2441]: E0517 00:37:52.403097 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"68e18fcd-7ed4-4596-bb1d-407a2a0928fe\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-zjc4h" podUID="68e18fcd-7ed4-4596-bb1d-407a2a0928fe" May 17 00:37:57.834959 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3507353693.mount: Deactivated successfully. May 17 00:37:57.889383 env[1439]: time="2025-05-17T00:37:57.889327789Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:57.896105 env[1439]: time="2025-05-17T00:37:57.896007161Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:57.900000 env[1439]: time="2025-05-17T00:37:57.899904545Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:57.903917 env[1439]: time="2025-05-17T00:37:57.903888028Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:57.904259 env[1439]: time="2025-05-17T00:37:57.904230027Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:37:57.922127 env[1439]: time="2025-05-17T00:37:57.922091652Z" level=info msg="CreateContainer within sandbox \"5abaccfcc7a1979cd7dc2d9516b7c2bf3f0d7eee839d17ac8135800d42c12b9a\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:37:57.971505 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2840064618.mount: Deactivated successfully. May 17 00:37:57.986556 env[1439]: time="2025-05-17T00:37:57.986509881Z" level=info msg="CreateContainer within sandbox \"5abaccfcc7a1979cd7dc2d9516b7c2bf3f0d7eee839d17ac8135800d42c12b9a\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e357c28ad19aa8f717feec3fbae98d960c7a6b9ea3bd9d202b02e0f1443e0b0b\"" May 17 00:37:57.988616 env[1439]: time="2025-05-17T00:37:57.987035879Z" level=info msg="StartContainer for \"e357c28ad19aa8f717feec3fbae98d960c7a6b9ea3bd9d202b02e0f1443e0b0b\"" May 17 00:37:58.004201 systemd[1]: Started cri-containerd-e357c28ad19aa8f717feec3fbae98d960c7a6b9ea3bd9d202b02e0f1443e0b0b.scope. May 17 00:37:58.039599 kernel: kauditd_printk_skb: 34 callbacks suppressed May 17 00:37:58.039728 kernel: audit: type=1400 audit(1747442278.021:990): avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.021000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.021000 audit[3604]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f5bbb26dc28 items=0 ppid=2916 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:58.057375 kernel: audit: type=1300 audit(1747442278.021:990): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f5bbb26dc28 items=0 ppid=2916 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:58.057599 kernel: audit: type=1327 audit(1747442278.021:990): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533353763323861643139616138663731376665656333666261653938 May 17 00:37:58.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533353763323861643139616138663731376665656333666261653938 May 17 00:37:58.076380 kernel: audit: type=1400 audit(1747442278.021:991): avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.021000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.097686 kernel: audit: type=1400 audit(1747442278.021:991): avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.021000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.110128 kernel: audit: type=1400 audit(1747442278.021:991): avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.021000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.110308 env[1439]: time="2025-05-17T00:37:58.098722218Z" level=info msg="StartContainer for \"e357c28ad19aa8f717feec3fbae98d960c7a6b9ea3bd9d202b02e0f1443e0b0b\" returns successfully" May 17 00:37:58.021000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.122472 kernel: audit: type=1400 audit(1747442278.021:991): avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.021000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.021000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.147135 kernel: audit: type=1400 audit(1747442278.021:991): avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.147248 kernel: audit: type=1400 audit(1747442278.021:991): avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.147279 kernel: audit: type=1400 audit(1747442278.021:991): avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.021000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.021000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.021000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.021000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.021000 audit: BPF prog-id=140 op=LOAD May 17 00:37:58.021000 audit[3604]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c0001b66b8 items=0 ppid=2916 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:58.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533353763323861643139616138663731376665656333666261653938 May 17 00:37:58.038000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.038000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.038000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.038000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.038000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.038000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.038000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.038000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.038000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.038000 audit: BPF prog-id=141 op=LOAD May 17 00:37:58.038000 audit[3604]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c0001b6708 items=0 ppid=2916 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:58.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533353763323861643139616138663731376665656333666261653938 May 17 00:37:58.038000 audit: BPF prog-id=141 op=UNLOAD May 17 00:37:58.038000 audit: BPF prog-id=140 op=UNLOAD May 17 00:37:58.038000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.038000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.038000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.038000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.038000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.038000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.038000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.038000 audit[3604]: AVC avc: denied { perfmon } for pid=3604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.038000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.038000 audit[3604]: AVC avc: denied { bpf } for pid=3604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:58.038000 audit: BPF prog-id=142 op=LOAD May 17 00:37:58.038000 audit[3604]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0001b6798 items=0 ppid=2916 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:58.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533353763323861643139616138663731376665656333666261653938 May 17 00:37:58.476144 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:37:58.476314 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:37:58.573851 kubelet[2441]: I0517 00:37:58.573781 2441 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-m6z75" podStartSLOduration=1.577334983 podStartE2EDuration="20.573754065s" podCreationTimestamp="2025-05-17 00:37:38 +0000 UTC" firstStartedPulling="2025-05-17 00:37:38.90886024 +0000 UTC m=+22.010652361" lastFinishedPulling="2025-05-17 00:37:57.905279422 +0000 UTC m=+41.007071443" observedRunningTime="2025-05-17 00:37:58.183593969 +0000 UTC m=+41.285385990" watchObservedRunningTime="2025-05-17 00:37:58.573754065 +0000 UTC m=+41.675546086" May 17 00:37:58.576202 env[1439]: time="2025-05-17T00:37:58.576160655Z" level=info msg="StopPodSandbox for \"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\"" May 17 00:37:58.707832 env[1439]: 2025-05-17 00:37:58.660 [INFO][3654] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" May 17 00:37:58.707832 env[1439]: 2025-05-17 00:37:58.660 [INFO][3654] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" iface="eth0" netns="/var/run/netns/cni-013b54ae-fa55-e994-aa3d-e19bd1c50c7c" May 17 00:37:58.707832 env[1439]: 2025-05-17 00:37:58.661 [INFO][3654] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" iface="eth0" netns="/var/run/netns/cni-013b54ae-fa55-e994-aa3d-e19bd1c50c7c" May 17 00:37:58.707832 env[1439]: 2025-05-17 00:37:58.661 [INFO][3654] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" iface="eth0" netns="/var/run/netns/cni-013b54ae-fa55-e994-aa3d-e19bd1c50c7c" May 17 00:37:58.707832 env[1439]: 2025-05-17 00:37:58.661 [INFO][3654] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" May 17 00:37:58.707832 env[1439]: 2025-05-17 00:37:58.661 [INFO][3654] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" May 17 00:37:58.707832 env[1439]: 2025-05-17 00:37:58.691 [INFO][3665] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" HandleID="k8s-pod-network.09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--56455d8897--p8lqr-eth0" May 17 00:37:58.707832 env[1439]: 2025-05-17 00:37:58.691 [INFO][3665] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:58.707832 env[1439]: 2025-05-17 00:37:58.691 [INFO][3665] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:58.707832 env[1439]: 2025-05-17 00:37:58.700 [WARNING][3665] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" HandleID="k8s-pod-network.09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--56455d8897--p8lqr-eth0" May 17 00:37:58.707832 env[1439]: 2025-05-17 00:37:58.700 [INFO][3665] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" HandleID="k8s-pod-network.09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--56455d8897--p8lqr-eth0" May 17 00:37:58.707832 env[1439]: 2025-05-17 00:37:58.702 [INFO][3665] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:58.707832 env[1439]: 2025-05-17 00:37:58.706 [INFO][3654] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" May 17 00:37:58.708442 env[1439]: time="2025-05-17T00:37:58.707822314Z" level=info msg="TearDown network for sandbox \"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\" successfully" May 17 00:37:58.708442 env[1439]: time="2025-05-17T00:37:58.707862514Z" level=info msg="StopPodSandbox for \"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\" returns successfully" May 17 00:37:58.817112 kubelet[2441]: I0517 00:37:58.817002 2441 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4-whisker-backend-key-pair\") pod \"ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4\" (UID: \"ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4\") " May 17 00:37:58.817518 kubelet[2441]: I0517 00:37:58.817368 2441 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-54rvf\" (UniqueName: \"kubernetes.io/projected/ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4-kube-api-access-54rvf\") pod \"ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4\" (UID: \"ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4\") " May 17 00:37:58.817518 kubelet[2441]: I0517 00:37:58.817423 2441 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4-whisker-ca-bundle\") pod \"ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4\" (UID: \"ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4\") " May 17 00:37:58.818112 kubelet[2441]: I0517 00:37:58.818076 2441 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4" (UID: "ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 17 00:37:58.822041 kubelet[2441]: I0517 00:37:58.822009 2441 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4" (UID: "ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 17 00:37:58.822159 kubelet[2441]: I0517 00:37:58.822128 2441 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4-kube-api-access-54rvf" (OuterVolumeSpecName: "kube-api-access-54rvf") pod "ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4" (UID: "ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4"). InnerVolumeSpecName "kube-api-access-54rvf". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 17 00:37:58.835011 systemd[1]: run-netns-cni\x2d013b54ae\x2dfa55\x2de994\x2daa3d\x2de19bd1c50c7c.mount: Deactivated successfully. May 17 00:37:58.835121 systemd[1]: var-lib-kubelet-pods-ba6b90d9\x2df691\x2d4be8\x2d9c7c\x2d2cdfd4d1c7a4-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d54rvf.mount: Deactivated successfully. May 17 00:37:58.835204 systemd[1]: var-lib-kubelet-pods-ba6b90d9\x2df691\x2d4be8\x2d9c7c\x2d2cdfd4d1c7a4-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. May 17 00:37:58.918700 kubelet[2441]: I0517 00:37:58.918648 2441 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4-whisker-ca-bundle\") on node \"ci-3510.3.7-n-191fd4fe6d\" DevicePath \"\"" May 17 00:37:58.918700 kubelet[2441]: I0517 00:37:58.918696 2441 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4-whisker-backend-key-pair\") on node \"ci-3510.3.7-n-191fd4fe6d\" DevicePath \"\"" May 17 00:37:58.918700 kubelet[2441]: I0517 00:37:58.918712 2441 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-54rvf\" (UniqueName: \"kubernetes.io/projected/ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4-kube-api-access-54rvf\") on node \"ci-3510.3.7-n-191fd4fe6d\" DevicePath \"\"" May 17 00:37:58.996202 systemd[1]: Removed slice kubepods-besteffort-podba6b90d9_f691_4be8_9c7c_2cdfd4d1c7a4.slice. May 17 00:37:59.248191 systemd[1]: Created slice kubepods-besteffort-pod1be837ab_f6c8_4d7d_9976_b853d9b4b123.slice. May 17 00:37:59.322944 kubelet[2441]: I0517 00:37:59.322836 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/1be837ab-f6c8-4d7d-9976-b853d9b4b123-whisker-backend-key-pair\") pod \"whisker-b8dc5df5c-7xlwx\" (UID: \"1be837ab-f6c8-4d7d-9976-b853d9b4b123\") " pod="calico-system/whisker-b8dc5df5c-7xlwx" May 17 00:37:59.323144 kubelet[2441]: I0517 00:37:59.322957 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fzjs4\" (UniqueName: \"kubernetes.io/projected/1be837ab-f6c8-4d7d-9976-b853d9b4b123-kube-api-access-fzjs4\") pod \"whisker-b8dc5df5c-7xlwx\" (UID: \"1be837ab-f6c8-4d7d-9976-b853d9b4b123\") " pod="calico-system/whisker-b8dc5df5c-7xlwx" May 17 00:37:59.323144 kubelet[2441]: I0517 00:37:59.323018 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1be837ab-f6c8-4d7d-9976-b853d9b4b123-whisker-ca-bundle\") pod \"whisker-b8dc5df5c-7xlwx\" (UID: \"1be837ab-f6c8-4d7d-9976-b853d9b4b123\") " pod="calico-system/whisker-b8dc5df5c-7xlwx" May 17 00:37:59.554367 env[1439]: time="2025-05-17T00:37:59.554206481Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-b8dc5df5c-7xlwx,Uid:1be837ab-f6c8-4d7d-9976-b853d9b4b123,Namespace:calico-system,Attempt:0,}" May 17 00:37:59.748123 systemd-networkd[1588]: cali8746b130db1: Link UP May 17 00:37:59.748584 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:37:59.756362 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8746b130db1: link becomes ready May 17 00:37:59.759703 systemd-networkd[1588]: cali8746b130db1: Gained carrier May 17 00:37:59.776903 env[1439]: 2025-05-17 00:37:59.641 [INFO][3687] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:37:59.776903 env[1439]: 2025-05-17 00:37:59.652 [INFO][3687] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--191fd4fe6d-k8s-whisker--b8dc5df5c--7xlwx-eth0 whisker-b8dc5df5c- calico-system 1be837ab-f6c8-4d7d-9976-b853d9b4b123 940 0 2025-05-17 00:37:59 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:b8dc5df5c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s ci-3510.3.7-n-191fd4fe6d whisker-b8dc5df5c-7xlwx eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali8746b130db1 [] [] }} ContainerID="e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b" Namespace="calico-system" Pod="whisker-b8dc5df5c-7xlwx" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--b8dc5df5c--7xlwx-" May 17 00:37:59.776903 env[1439]: 2025-05-17 00:37:59.652 [INFO][3687] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b" Namespace="calico-system" Pod="whisker-b8dc5df5c-7xlwx" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--b8dc5df5c--7xlwx-eth0" May 17 00:37:59.776903 env[1439]: 2025-05-17 00:37:59.675 [INFO][3699] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b" HandleID="k8s-pod-network.e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--b8dc5df5c--7xlwx-eth0" May 17 00:37:59.776903 env[1439]: 2025-05-17 00:37:59.675 [INFO][3699] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b" HandleID="k8s-pod-network.e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--b8dc5df5c--7xlwx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000235950), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-191fd4fe6d", "pod":"whisker-b8dc5df5c-7xlwx", "timestamp":"2025-05-17 00:37:59.675269094 +0000 UTC"}, Hostname:"ci-3510.3.7-n-191fd4fe6d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:37:59.776903 env[1439]: 2025-05-17 00:37:59.675 [INFO][3699] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:37:59.776903 env[1439]: 2025-05-17 00:37:59.675 [INFO][3699] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:37:59.776903 env[1439]: 2025-05-17 00:37:59.675 [INFO][3699] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-191fd4fe6d' May 17 00:37:59.776903 env[1439]: 2025-05-17 00:37:59.687 [INFO][3699] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:59.776903 env[1439]: 2025-05-17 00:37:59.692 [INFO][3699] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:59.776903 env[1439]: 2025-05-17 00:37:59.696 [INFO][3699] ipam/ipam.go 511: Trying affinity for 192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:59.776903 env[1439]: 2025-05-17 00:37:59.697 [INFO][3699] ipam/ipam.go 158: Attempting to load block cidr=192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:59.776903 env[1439]: 2025-05-17 00:37:59.699 [INFO][3699] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:59.776903 env[1439]: 2025-05-17 00:37:59.699 [INFO][3699] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.85.192/26 handle="k8s-pod-network.e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:59.776903 env[1439]: 2025-05-17 00:37:59.700 [INFO][3699] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b May 17 00:37:59.776903 env[1439]: 2025-05-17 00:37:59.704 [INFO][3699] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.85.192/26 handle="k8s-pod-network.e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:59.776903 env[1439]: 2025-05-17 00:37:59.714 [INFO][3699] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.85.193/26] block=192.168.85.192/26 handle="k8s-pod-network.e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:59.776903 env[1439]: 2025-05-17 00:37:59.714 [INFO][3699] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.85.193/26] handle="k8s-pod-network.e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:37:59.776903 env[1439]: 2025-05-17 00:37:59.714 [INFO][3699] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:37:59.776903 env[1439]: 2025-05-17 00:37:59.714 [INFO][3699] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.85.193/26] IPv6=[] ContainerID="e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b" HandleID="k8s-pod-network.e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--b8dc5df5c--7xlwx-eth0" May 17 00:37:59.777973 env[1439]: 2025-05-17 00:37:59.715 [INFO][3687] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b" Namespace="calico-system" Pod="whisker-b8dc5df5c-7xlwx" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--b8dc5df5c--7xlwx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-whisker--b8dc5df5c--7xlwx-eth0", GenerateName:"whisker-b8dc5df5c-", Namespace:"calico-system", SelfLink:"", UID:"1be837ab-f6c8-4d7d-9976-b853d9b4b123", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"b8dc5df5c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"", Pod:"whisker-b8dc5df5c-7xlwx", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.85.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali8746b130db1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:59.777973 env[1439]: 2025-05-17 00:37:59.715 [INFO][3687] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.85.193/32] ContainerID="e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b" Namespace="calico-system" Pod="whisker-b8dc5df5c-7xlwx" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--b8dc5df5c--7xlwx-eth0" May 17 00:37:59.777973 env[1439]: 2025-05-17 00:37:59.716 [INFO][3687] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8746b130db1 ContainerID="e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b" Namespace="calico-system" Pod="whisker-b8dc5df5c-7xlwx" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--b8dc5df5c--7xlwx-eth0" May 17 00:37:59.777973 env[1439]: 2025-05-17 00:37:59.762 [INFO][3687] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b" Namespace="calico-system" Pod="whisker-b8dc5df5c-7xlwx" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--b8dc5df5c--7xlwx-eth0" May 17 00:37:59.777973 env[1439]: 2025-05-17 00:37:59.763 [INFO][3687] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b" Namespace="calico-system" Pod="whisker-b8dc5df5c-7xlwx" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--b8dc5df5c--7xlwx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-whisker--b8dc5df5c--7xlwx-eth0", GenerateName:"whisker-b8dc5df5c-", Namespace:"calico-system", SelfLink:"", UID:"1be837ab-f6c8-4d7d-9976-b853d9b4b123", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"b8dc5df5c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b", Pod:"whisker-b8dc5df5c-7xlwx", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.85.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali8746b130db1", MAC:"d2:ea:a6:92:5a:30", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:37:59.777973 env[1439]: 2025-05-17 00:37:59.774 [INFO][3687] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b" Namespace="calico-system" Pod="whisker-b8dc5df5c-7xlwx" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--b8dc5df5c--7xlwx-eth0" May 17 00:37:59.790610 env[1439]: time="2025-05-17T00:37:59.790544830Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:59.790760 env[1439]: time="2025-05-17T00:37:59.790580930Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:59.790760 env[1439]: time="2025-05-17T00:37:59.790594530Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:59.790760 env[1439]: time="2025-05-17T00:37:59.790725029Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b pid=3719 runtime=io.containerd.runc.v2 May 17 00:37:59.806776 systemd[1]: Started cri-containerd-e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b.scope. May 17 00:37:59.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.822000 audit: BPF prog-id=143 op=LOAD May 17 00:37:59.823000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3719 pid=3731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531363262643061376161613038316563636531336565393663333765 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3719 pid=3731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531363262643061376161613038316563636531336565393663333765 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit: BPF prog-id=144 op=LOAD May 17 00:37:59.823000 audit[3731]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002d7ce0 items=0 ppid=3719 pid=3731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531363262643061376161613038316563636531336565393663333765 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit: BPF prog-id=145 op=LOAD May 17 00:37:59.823000 audit[3731]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002d7d28 items=0 ppid=3719 pid=3731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531363262643061376161613038316563636531336565393663333765 May 17 00:37:59.823000 audit: BPF prog-id=145 op=UNLOAD May 17 00:37:59.823000 audit: BPF prog-id=144 op=UNLOAD May 17 00:37:59.823000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:59.823000 audit: BPF prog-id=146 op=LOAD May 17 00:37:59.823000 audit[3731]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00035c138 items=0 ppid=3719 pid=3731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531363262643061376161613038316563636531336565393663333765 May 17 00:37:59.865997 env[1439]: time="2025-05-17T00:37:59.865950327Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-b8dc5df5c-7xlwx,Uid:1be837ab-f6c8-4d7d-9976-b853d9b4b123,Namespace:calico-system,Attempt:0,} returns sandbox id \"e162bd0a7aaa081ecce13ee96c37e5a09aac70ef8db96516768d37a20dfc890b\"" May 17 00:37:59.868039 env[1439]: time="2025-05-17T00:37:59.868006318Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:37:59.912000 audit[3793]: AVC avc: denied { write } for pid=3793 comm="tee" name="fd" dev="proc" ino=30909 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:59.914000 audit[3799]: AVC avc: denied { write } for pid=3799 comm="tee" name="fd" dev="proc" ino=30912 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:59.920000 audit[3795]: AVC avc: denied { write } for pid=3795 comm="tee" name="fd" dev="proc" ino=30923 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:59.912000 audit[3793]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe490a37cf a2=241 a3=1b6 items=1 ppid=3760 pid=3793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.912000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:37:59.912000 audit: PATH item=0 name="/dev/fd/63" inode=30207 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:59.920000 audit[3795]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe7e1597c0 a2=241 a3=1b6 items=1 ppid=3757 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.912000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:59.920000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:37:59.920000 audit: PATH item=0 name="/dev/fd/63" inode=30886 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:59.920000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:59.914000 audit[3799]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0a9af7cf a2=241 a3=1b6 items=1 ppid=3758 pid=3799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.914000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:37:59.924000 audit[3811]: AVC avc: denied { write } for pid=3811 comm="tee" name="fd" dev="proc" ino=30930 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:59.914000 audit: PATH item=0 name="/dev/fd/63" inode=30895 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:59.914000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:59.933000 audit[3813]: AVC avc: denied { write } for pid=3813 comm="tee" name="fd" dev="proc" ino=30933 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:59.924000 audit[3811]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd782017d1 a2=241 a3=1b6 items=1 ppid=3763 pid=3811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.924000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:37:59.924000 audit: PATH item=0 name="/dev/fd/63" inode=30903 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:59.924000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:59.944000 audit[3822]: AVC avc: denied { write } for pid=3822 comm="tee" name="fd" dev="proc" ino=30939 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:59.933000 audit[3813]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc69d4d7bf a2=241 a3=1b6 items=1 ppid=3773 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.933000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:37:59.933000 audit: PATH item=0 name="/dev/fd/63" inode=30904 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:59.933000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:59.944000 audit[3822]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffedc26d7d0 a2=241 a3=1b6 items=1 ppid=3775 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.944000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:37:59.944000 audit: PATH item=0 name="/dev/fd/63" inode=30927 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:59.944000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:59.969000 audit[3840]: AVC avc: denied { write } for pid=3840 comm="tee" name="fd" dev="proc" ino=30947 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:59.969000 audit[3840]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff2e5087cf a2=241 a3=1b6 items=1 ppid=3777 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.969000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:37:59.969000 audit: PATH item=0 name="/dev/fd/63" inode=30944 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:59.969000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:38:00.062682 env[1439]: time="2025-05-17T00:38:00.062547340Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:38:00.065941 env[1439]: time="2025-05-17T00:38:00.065869627Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:38:00.066250 kubelet[2441]: E0517 00:38:00.066188 2441 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:38:00.066622 kubelet[2441]: E0517 00:38:00.066274 2441 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:38:00.066689 kubelet[2441]: E0517 00:38:00.066489 2441 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:390ed499d1204bf499760421b62bf110,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-fzjs4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-b8dc5df5c-7xlwx_calico-system(1be837ab-f6c8-4d7d-9976-b853d9b4b123): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:38:00.068880 env[1439]: time="2025-05-17T00:38:00.068844115Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:38:00.249095 env[1439]: time="2025-05-17T00:38:00.249029005Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:38:00.252094 env[1439]: time="2025-05-17T00:38:00.252038293Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:38:00.252361 kubelet[2441]: E0517 00:38:00.252296 2441 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:38:00.252492 kubelet[2441]: E0517 00:38:00.252383 2441 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:38:00.252580 kubelet[2441]: E0517 00:38:00.252528 2441 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fzjs4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-b8dc5df5c-7xlwx_calico-system(1be837ab-f6c8-4d7d-9976-b853d9b4b123): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:38:00.253987 kubelet[2441]: E0517 00:38:00.253930 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-b8dc5df5c-7xlwx" podUID="1be837ab-f6c8-4d7d-9976-b853d9b4b123" May 17 00:38:00.259000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit: BPF prog-id=147 op=LOAD May 17 00:38:00.259000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe4de79ff0 a2=98 a3=3 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.259000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.259000 audit: BPF prog-id=147 op=UNLOAD May 17 00:38:00.259000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit: BPF prog-id=148 op=LOAD May 17 00:38:00.259000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe4de79de0 a2=94 a3=54428f items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.259000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.259000 audit: BPF prog-id=148 op=UNLOAD May 17 00:38:00.259000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.259000 audit: BPF prog-id=149 op=LOAD May 17 00:38:00.259000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe4de79e10 a2=94 a3=2 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.259000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.259000 audit: BPF prog-id=149 op=UNLOAD May 17 00:38:00.388000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.388000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.388000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.388000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.388000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.388000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.388000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.388000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.388000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.388000 audit: BPF prog-id=150 op=LOAD May 17 00:38:00.388000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe4de79cd0 a2=94 a3=1 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.388000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.389000 audit: BPF prog-id=150 op=UNLOAD May 17 00:38:00.389000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.389000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe4de79da0 a2=50 a3=7ffe4de79e80 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.389000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.398000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.398000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4de79ce0 a2=28 a3=0 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.398000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.398000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.398000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4de79d10 a2=28 a3=0 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.398000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.398000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.398000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4de79c20 a2=28 a3=0 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.398000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.398000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.398000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4de79d30 a2=28 a3=0 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.398000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.398000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.398000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4de79d10 a2=28 a3=0 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.398000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.398000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.398000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4de79d00 a2=28 a3=0 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.398000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.398000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.398000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4de79d30 a2=28 a3=0 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.398000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.398000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.398000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4de79d10 a2=28 a3=0 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.398000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.398000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.398000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4de79d30 a2=28 a3=0 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.398000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.398000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.398000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4de79d00 a2=28 a3=0 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.398000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.398000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.398000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4de79d70 a2=28 a3=0 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.398000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.399000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe4de79b20 a2=50 a3=1 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.399000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.399000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit: BPF prog-id=151 op=LOAD May 17 00:38:00.399000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe4de79b20 a2=94 a3=5 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.399000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.399000 audit: BPF prog-id=151 op=UNLOAD May 17 00:38:00.399000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe4de79bd0 a2=50 a3=1 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.399000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.399000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe4de79cf0 a2=4 a3=38 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.399000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.399000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:00.399000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe4de79d40 a2=94 a3=6 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.399000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.399000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.399000 audit[3873]: AVC avc: denied { confidentiality } for pid=3873 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:00.399000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe4de794f0 a2=94 a3=88 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.399000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.400000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.400000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.400000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.400000 audit[3873]: AVC avc: denied { bpf } for pid=3873 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.400000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.400000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.400000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.400000 audit[3873]: AVC avc: denied { perfmon } for pid=3873 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.400000 audit[3873]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe4de794f0 a2=94 a3=88 items=0 ppid=3759 pid=3873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.400000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:38:00.409000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.409000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.409000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.409000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.409000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.409000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.409000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.409000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.409000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.409000 audit: BPF prog-id=152 op=LOAD May 17 00:38:00.409000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd852368b0 a2=98 a3=1999999999999999 items=0 ppid=3759 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.409000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:38:00.409000 audit: BPF prog-id=152 op=UNLOAD May 17 00:38:00.409000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.409000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.409000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.409000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.409000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.409000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.409000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.409000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.409000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.409000 audit: BPF prog-id=153 op=LOAD May 17 00:38:00.409000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd85236790 a2=94 a3=ffff items=0 ppid=3759 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.409000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:38:00.410000 audit: BPF prog-id=153 op=UNLOAD May 17 00:38:00.410000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.410000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.410000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.410000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.410000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.410000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.410000 audit[3876]: AVC avc: denied { perfmon } for pid=3876 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.410000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.410000 audit[3876]: AVC avc: denied { bpf } for pid=3876 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.410000 audit: BPF prog-id=154 op=LOAD May 17 00:38:00.410000 audit[3876]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd852367d0 a2=94 a3=7ffd852369b0 items=0 ppid=3759 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.410000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:38:00.410000 audit: BPF prog-id=154 op=UNLOAD May 17 00:38:00.519644 systemd-networkd[1588]: vxlan.calico: Link UP May 17 00:38:00.519654 systemd-networkd[1588]: vxlan.calico: Gained carrier May 17 00:38:00.545000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.545000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.545000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.545000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.545000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.545000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.545000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.545000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.545000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.545000 audit: BPF prog-id=155 op=LOAD May 17 00:38:00.545000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcfa7ae740 a2=98 a3=0 items=0 ppid=3759 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.545000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:38:00.545000 audit: BPF prog-id=155 op=UNLOAD May 17 00:38:00.545000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.545000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.545000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.545000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.545000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.545000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.545000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.545000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.545000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.545000 audit: BPF prog-id=156 op=LOAD May 17 00:38:00.545000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcfa7ae550 a2=94 a3=54428f items=0 ppid=3759 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.545000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:38:00.546000 audit: BPF prog-id=156 op=UNLOAD May 17 00:38:00.546000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit: BPF prog-id=157 op=LOAD May 17 00:38:00.546000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcfa7ae580 a2=94 a3=2 items=0 ppid=3759 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.546000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:38:00.546000 audit: BPF prog-id=157 op=UNLOAD May 17 00:38:00.546000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcfa7ae450 a2=28 a3=0 items=0 ppid=3759 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.546000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcfa7ae480 a2=28 a3=0 items=0 ppid=3759 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.546000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcfa7ae390 a2=28 a3=0 items=0 ppid=3759 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.546000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcfa7ae4a0 a2=28 a3=0 items=0 ppid=3759 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.546000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcfa7ae480 a2=28 a3=0 items=0 ppid=3759 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.546000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcfa7ae470 a2=28 a3=0 items=0 ppid=3759 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.546000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcfa7ae4a0 a2=28 a3=0 items=0 ppid=3759 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.546000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcfa7ae480 a2=28 a3=0 items=0 ppid=3759 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.546000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcfa7ae4a0 a2=28 a3=0 items=0 ppid=3759 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.546000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcfa7ae470 a2=28 a3=0 items=0 ppid=3759 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.546000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcfa7ae4e0 a2=28 a3=0 items=0 ppid=3759 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.546000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.546000 audit: BPF prog-id=158 op=LOAD May 17 00:38:00.546000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcfa7ae350 a2=94 a3=0 items=0 ppid=3759 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.546000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:38:00.546000 audit: BPF prog-id=158 op=UNLOAD May 17 00:38:00.547000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.547000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffcfa7ae340 a2=50 a3=2800 items=0 ppid=3759 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.547000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:38:00.549000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.549000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffcfa7ae340 a2=50 a3=2800 items=0 ppid=3759 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.549000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:38:00.549000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.549000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.549000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.549000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.549000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.549000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.549000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.549000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.549000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.549000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.549000 audit: BPF prog-id=159 op=LOAD May 17 00:38:00.549000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcfa7adb60 a2=94 a3=2 items=0 ppid=3759 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.549000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:38:00.549000 audit: BPF prog-id=159 op=UNLOAD May 17 00:38:00.549000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.549000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.549000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.549000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.549000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.549000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.549000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.549000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.549000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.549000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.549000 audit: BPF prog-id=160 op=LOAD May 17 00:38:00.549000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcfa7adc60 a2=94 a3=30 items=0 ppid=3759 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.549000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:38:00.556000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.556000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.556000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.556000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.556000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.556000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.556000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.556000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.556000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.556000 audit: BPF prog-id=161 op=LOAD May 17 00:38:00.556000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb7447930 a2=98 a3=0 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.556000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.559000 audit: BPF prog-id=161 op=UNLOAD May 17 00:38:00.559000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.559000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.559000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.559000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.559000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.559000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.559000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.559000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.559000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.559000 audit: BPF prog-id=162 op=LOAD May 17 00:38:00.559000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcb7447720 a2=94 a3=54428f items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.559000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.559000 audit: BPF prog-id=162 op=UNLOAD May 17 00:38:00.559000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.559000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.559000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.559000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.559000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.559000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.559000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.559000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.559000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.559000 audit: BPF prog-id=163 op=LOAD May 17 00:38:00.559000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcb7447750 a2=94 a3=2 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.559000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.559000 audit: BPF prog-id=163 op=UNLOAD May 17 00:38:00.691000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.691000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.691000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.691000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.691000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.691000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.691000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.691000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.691000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.691000 audit: BPF prog-id=164 op=LOAD May 17 00:38:00.691000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcb7447610 a2=94 a3=1 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.691000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.691000 audit: BPF prog-id=164 op=UNLOAD May 17 00:38:00.691000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.691000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcb74476e0 a2=50 a3=7ffcb74477c0 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.691000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.704000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.704000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb7447620 a2=28 a3=0 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.704000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.704000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb7447650 a2=28 a3=0 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.704000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.704000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb7447560 a2=28 a3=0 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.704000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.704000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb7447670 a2=28 a3=0 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.704000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.704000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb7447650 a2=28 a3=0 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.704000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.704000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb7447640 a2=28 a3=0 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.704000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.704000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb7447670 a2=28 a3=0 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.704000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.704000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb7447650 a2=28 a3=0 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.704000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.704000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb7447670 a2=28 a3=0 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.704000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.704000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb7447640 a2=28 a3=0 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcb74476b0 a2=28 a3=0 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.705000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcb7447460 a2=50 a3=1 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.705000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit: BPF prog-id=165 op=LOAD May 17 00:38:00.705000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcb7447460 a2=94 a3=5 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.705000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.705000 audit: BPF prog-id=165 op=UNLOAD May 17 00:38:00.705000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcb7447510 a2=50 a3=1 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.705000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcb7447630 a2=4 a3=38 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.705000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { confidentiality } for pid=3904 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:00.705000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcb7447680 a2=94 a3=6 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.705000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.705000 audit[3904]: AVC avc: denied { confidentiality } for pid=3904 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:00.705000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcb7446e30 a2=94 a3=88 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.705000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.706000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.706000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.706000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.706000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.706000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.706000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.706000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.706000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.706000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcb7446e30 a2=94 a3=88 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.706000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.706000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb7448860 a2=10 a3=f8f00800 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.706000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.706000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb7448700 a2=10 a3=3 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.707000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.707000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb74486a0 a2=10 a3=3 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.707000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.707000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:00.707000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcb74486a0 a2=10 a3=7 items=0 ppid=3759 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.707000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:38:00.715000 audit: BPF prog-id=160 op=UNLOAD May 17 00:38:00.947000 audit[3933]: NETFILTER_CFG table=mangle:104 family=2 entries=16 op=nft_register_chain pid=3933 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:00.947000 audit[3933]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffee26ec410 a2=0 a3=7ffee26ec3fc items=0 ppid=3759 pid=3933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.947000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:00.980000 audit[3934]: NETFILTER_CFG table=nat:105 family=2 entries=15 op=nft_register_chain pid=3934 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:00.980000 audit[3934]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd1791aad0 a2=0 a3=7ffd1791aabc items=0 ppid=3759 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.980000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:00.983000 audit[3932]: NETFILTER_CFG table=raw:106 family=2 entries=21 op=nft_register_chain pid=3932 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:00.983000 audit[3932]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe51f15310 a2=0 a3=7ffe51f152fc items=0 ppid=3759 pid=3932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.983000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:00.993569 kubelet[2441]: I0517 00:38:00.993534 2441 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4" path="/var/lib/kubelet/pods/ba6b90d9-f691-4be8-9c7c-2cdfd4d1c7a4/volumes" May 17 00:38:00.990000 audit[3936]: NETFILTER_CFG table=filter:107 family=2 entries=94 op=nft_register_chain pid=3936 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:00.990000 audit[3936]: SYSCALL arch=c000003e syscall=46 success=yes exit=53116 a0=3 a1=7ffd170f52c0 a2=0 a3=7ffd170f52ac items=0 ppid=3759 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:00.990000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:01.173428 kubelet[2441]: E0517 00:38:01.173314 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-b8dc5df5c-7xlwx" podUID="1be837ab-f6c8-4d7d-9976-b853d9b4b123" May 17 00:38:01.203000 audit[3949]: NETFILTER_CFG table=filter:108 family=2 entries=20 op=nft_register_rule pid=3949 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:01.203000 audit[3949]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffd9f0adfc0 a2=0 a3=7ffd9f0adfac items=0 ppid=2549 pid=3949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:01.203000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:01.208000 audit[3949]: NETFILTER_CFG table=nat:109 family=2 entries=14 op=nft_register_rule pid=3949 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:01.208000 audit[3949]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd9f0adfc0 a2=0 a3=0 items=0 ppid=2549 pid=3949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:01.208000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:01.704623 systemd-networkd[1588]: cali8746b130db1: Gained IPv6LL May 17 00:38:02.216558 systemd-networkd[1588]: vxlan.calico: Gained IPv6LL May 17 00:38:03.990853 env[1439]: time="2025-05-17T00:38:03.990301431Z" level=info msg="StopPodSandbox for \"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\"" May 17 00:38:03.990853 env[1439]: time="2025-05-17T00:38:03.990427330Z" level=info msg="StopPodSandbox for \"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\"" May 17 00:38:04.108107 env[1439]: 2025-05-17 00:38:04.067 [INFO][3972] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" May 17 00:38:04.108107 env[1439]: 2025-05-17 00:38:04.067 [INFO][3972] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" iface="eth0" netns="/var/run/netns/cni-bce90602-dc1b-99c5-bd5e-523da03d6759" May 17 00:38:04.108107 env[1439]: 2025-05-17 00:38:04.068 [INFO][3972] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" iface="eth0" netns="/var/run/netns/cni-bce90602-dc1b-99c5-bd5e-523da03d6759" May 17 00:38:04.108107 env[1439]: 2025-05-17 00:38:04.068 [INFO][3972] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" iface="eth0" netns="/var/run/netns/cni-bce90602-dc1b-99c5-bd5e-523da03d6759" May 17 00:38:04.108107 env[1439]: 2025-05-17 00:38:04.068 [INFO][3972] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" May 17 00:38:04.108107 env[1439]: 2025-05-17 00:38:04.068 [INFO][3972] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" May 17 00:38:04.108107 env[1439]: 2025-05-17 00:38:04.096 [INFO][3986] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" HandleID="k8s-pod-network.cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0" May 17 00:38:04.108107 env[1439]: 2025-05-17 00:38:04.096 [INFO][3986] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:04.108107 env[1439]: 2025-05-17 00:38:04.096 [INFO][3986] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:04.108107 env[1439]: 2025-05-17 00:38:04.103 [WARNING][3986] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" HandleID="k8s-pod-network.cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0" May 17 00:38:04.108107 env[1439]: 2025-05-17 00:38:04.103 [INFO][3986] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" HandleID="k8s-pod-network.cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0" May 17 00:38:04.108107 env[1439]: 2025-05-17 00:38:04.105 [INFO][3986] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:04.108107 env[1439]: 2025-05-17 00:38:04.106 [INFO][3972] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" May 17 00:38:04.112328 systemd[1]: run-netns-cni\x2dbce90602\x2ddc1b\x2d99c5\x2dbd5e\x2d523da03d6759.mount: Deactivated successfully. May 17 00:38:04.113747 env[1439]: time="2025-05-17T00:38:04.113698682Z" level=info msg="TearDown network for sandbox \"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\" successfully" May 17 00:38:04.113874 env[1439]: time="2025-05-17T00:38:04.113856081Z" level=info msg="StopPodSandbox for \"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\" returns successfully" May 17 00:38:04.114693 env[1439]: time="2025-05-17T00:38:04.114659278Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-z2hcl,Uid:8dfb2f5b-365c-4be9-abc4-56ee0d856953,Namespace:kube-system,Attempt:1,}" May 17 00:38:04.129304 env[1439]: 2025-05-17 00:38:04.058 [INFO][3971] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" May 17 00:38:04.129304 env[1439]: 2025-05-17 00:38:04.058 [INFO][3971] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" iface="eth0" netns="/var/run/netns/cni-ef6bf6b6-ba43-89b2-2198-9cbbdf4062e4" May 17 00:38:04.129304 env[1439]: 2025-05-17 00:38:04.059 [INFO][3971] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" iface="eth0" netns="/var/run/netns/cni-ef6bf6b6-ba43-89b2-2198-9cbbdf4062e4" May 17 00:38:04.129304 env[1439]: 2025-05-17 00:38:04.059 [INFO][3971] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" iface="eth0" netns="/var/run/netns/cni-ef6bf6b6-ba43-89b2-2198-9cbbdf4062e4" May 17 00:38:04.129304 env[1439]: 2025-05-17 00:38:04.059 [INFO][3971] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" May 17 00:38:04.129304 env[1439]: 2025-05-17 00:38:04.059 [INFO][3971] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" May 17 00:38:04.129304 env[1439]: 2025-05-17 00:38:04.118 [INFO][3984] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" HandleID="k8s-pod-network.3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:38:04.129304 env[1439]: 2025-05-17 00:38:04.118 [INFO][3984] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:04.129304 env[1439]: 2025-05-17 00:38:04.118 [INFO][3984] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:04.129304 env[1439]: 2025-05-17 00:38:04.124 [WARNING][3984] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" HandleID="k8s-pod-network.3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:38:04.129304 env[1439]: 2025-05-17 00:38:04.124 [INFO][3984] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" HandleID="k8s-pod-network.3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:38:04.129304 env[1439]: 2025-05-17 00:38:04.127 [INFO][3984] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:04.129304 env[1439]: 2025-05-17 00:38:04.128 [INFO][3971] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" May 17 00:38:04.134518 env[1439]: time="2025-05-17T00:38:04.132834312Z" level=info msg="TearDown network for sandbox \"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\" successfully" May 17 00:38:04.134518 env[1439]: time="2025-05-17T00:38:04.132866312Z" level=info msg="StopPodSandbox for \"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\" returns successfully" May 17 00:38:04.134518 env[1439]: time="2025-05-17T00:38:04.133569509Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74bc7c86ff-lcldf,Uid:30df0e77-1e34-4685-80e6-9457028d7acb,Namespace:calico-apiserver,Attempt:1,}" May 17 00:38:04.132663 systemd[1]: run-netns-cni\x2def6bf6b6\x2dba43\x2d89b2\x2d2198\x2d9cbbdf4062e4.mount: Deactivated successfully. May 17 00:38:04.331506 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:38:04.331619 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali47acec6d416: link becomes ready May 17 00:38:04.336132 systemd-networkd[1588]: cali47acec6d416: Link UP May 17 00:38:04.339725 systemd-networkd[1588]: cali47acec6d416: Gained carrier May 17 00:38:04.357065 env[1439]: 2025-05-17 00:38:04.230 [INFO][3997] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0 coredns-668d6bf9bc- kube-system 8dfb2f5b-365c-4be9-abc4-56ee0d856953 971 0 2025-05-17 00:37:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-191fd4fe6d coredns-668d6bf9bc-z2hcl eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali47acec6d416 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661" Namespace="kube-system" Pod="coredns-668d6bf9bc-z2hcl" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-" May 17 00:38:04.357065 env[1439]: 2025-05-17 00:38:04.230 [INFO][3997] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661" Namespace="kube-system" Pod="coredns-668d6bf9bc-z2hcl" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0" May 17 00:38:04.357065 env[1439]: 2025-05-17 00:38:04.276 [INFO][4022] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661" HandleID="k8s-pod-network.e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0" May 17 00:38:04.357065 env[1439]: 2025-05-17 00:38:04.276 [INFO][4022] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661" HandleID="k8s-pod-network.e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ad700), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-191fd4fe6d", "pod":"coredns-668d6bf9bc-z2hcl", "timestamp":"2025-05-17 00:38:04.276398691 +0000 UTC"}, Hostname:"ci-3510.3.7-n-191fd4fe6d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:38:04.357065 env[1439]: 2025-05-17 00:38:04.277 [INFO][4022] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:04.357065 env[1439]: 2025-05-17 00:38:04.277 [INFO][4022] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:04.357065 env[1439]: 2025-05-17 00:38:04.277 [INFO][4022] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-191fd4fe6d' May 17 00:38:04.357065 env[1439]: 2025-05-17 00:38:04.285 [INFO][4022] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:04.357065 env[1439]: 2025-05-17 00:38:04.290 [INFO][4022] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:04.357065 env[1439]: 2025-05-17 00:38:04.294 [INFO][4022] ipam/ipam.go 511: Trying affinity for 192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:04.357065 env[1439]: 2025-05-17 00:38:04.296 [INFO][4022] ipam/ipam.go 158: Attempting to load block cidr=192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:04.357065 env[1439]: 2025-05-17 00:38:04.298 [INFO][4022] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:04.357065 env[1439]: 2025-05-17 00:38:04.298 [INFO][4022] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.85.192/26 handle="k8s-pod-network.e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:04.357065 env[1439]: 2025-05-17 00:38:04.300 [INFO][4022] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661 May 17 00:38:04.357065 env[1439]: 2025-05-17 00:38:04.309 [INFO][4022] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.85.192/26 handle="k8s-pod-network.e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:04.357065 env[1439]: 2025-05-17 00:38:04.314 [INFO][4022] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.85.194/26] block=192.168.85.192/26 handle="k8s-pod-network.e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:04.357065 env[1439]: 2025-05-17 00:38:04.315 [INFO][4022] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.85.194/26] handle="k8s-pod-network.e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:04.357065 env[1439]: 2025-05-17 00:38:04.315 [INFO][4022] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:04.357065 env[1439]: 2025-05-17 00:38:04.315 [INFO][4022] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.85.194/26] IPv6=[] ContainerID="e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661" HandleID="k8s-pod-network.e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0" May 17 00:38:04.358021 env[1439]: 2025-05-17 00:38:04.319 [INFO][3997] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661" Namespace="kube-system" Pod="coredns-668d6bf9bc-z2hcl" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"8dfb2f5b-365c-4be9-abc4-56ee0d856953", ResourceVersion:"971", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"", Pod:"coredns-668d6bf9bc-z2hcl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali47acec6d416", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:04.358021 env[1439]: 2025-05-17 00:38:04.319 [INFO][3997] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.85.194/32] ContainerID="e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661" Namespace="kube-system" Pod="coredns-668d6bf9bc-z2hcl" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0" May 17 00:38:04.358021 env[1439]: 2025-05-17 00:38:04.319 [INFO][3997] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali47acec6d416 ContainerID="e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661" Namespace="kube-system" Pod="coredns-668d6bf9bc-z2hcl" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0" May 17 00:38:04.358021 env[1439]: 2025-05-17 00:38:04.339 [INFO][3997] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661" Namespace="kube-system" Pod="coredns-668d6bf9bc-z2hcl" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0" May 17 00:38:04.358021 env[1439]: 2025-05-17 00:38:04.340 [INFO][3997] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661" Namespace="kube-system" Pod="coredns-668d6bf9bc-z2hcl" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"8dfb2f5b-365c-4be9-abc4-56ee0d856953", ResourceVersion:"971", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661", Pod:"coredns-668d6bf9bc-z2hcl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali47acec6d416", MAC:"ea:ae:5e:a3:9a:13", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:04.358021 env[1439]: 2025-05-17 00:38:04.353 [INFO][3997] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661" Namespace="kube-system" Pod="coredns-668d6bf9bc-z2hcl" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0" May 17 00:38:04.374000 audit[4060]: NETFILTER_CFG table=filter:110 family=2 entries=42 op=nft_register_chain pid=4060 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:04.389158 kernel: kauditd_printk_skb: 623 callbacks suppressed May 17 00:38:04.389254 kernel: audit: type=1325 audit(1747442284.374:1118): table=filter:110 family=2 entries=42 op=nft_register_chain pid=4060 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:04.389789 env[1439]: time="2025-05-17T00:38:04.389544179Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:38:04.389789 env[1439]: time="2025-05-17T00:38:04.389587479Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:38:04.389789 env[1439]: time="2025-05-17T00:38:04.389601779Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:38:04.390034 env[1439]: time="2025-05-17T00:38:04.389837578Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661 pid=4055 runtime=io.containerd.runc.v2 May 17 00:38:04.374000 audit[4060]: SYSCALL arch=c000003e syscall=46 success=yes exit=22552 a0=3 a1=7ffc5e8d6e70 a2=0 a3=7ffc5e8d6e5c items=0 ppid=3759 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:04.408366 kernel: audit: type=1300 audit(1747442284.374:1118): arch=c000003e syscall=46 success=yes exit=22552 a0=3 a1=7ffc5e8d6e70 a2=0 a3=7ffc5e8d6e5c items=0 ppid=3759 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:04.374000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:04.421368 kernel: audit: type=1327 audit(1747442284.374:1118): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:04.439437 systemd[1]: Started cri-containerd-e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661.scope. May 17 00:38:04.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471451 kernel: audit: type=1400 audit(1747442284.457:1119): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.482760 systemd-networkd[1588]: calic12dbb93b27: Link UP May 17 00:38:04.485369 systemd-networkd[1588]: calic12dbb93b27: Gained carrier May 17 00:38:04.494252 kernel: audit: type=1400 audit(1747442284.457:1120): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.494327 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic12dbb93b27: link becomes ready May 17 00:38:04.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.511426 kernel: audit: type=1400 audit(1747442284.457:1121): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.525381 kernel: audit: type=1400 audit(1747442284.457:1122): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.540423 kernel: audit: type=1400 audit(1747442284.457:1123): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.540462 env[1439]: 2025-05-17 00:38:04.256 [INFO][4008] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0 calico-apiserver-74bc7c86ff- calico-apiserver 30df0e77-1e34-4685-80e6-9457028d7acb 970 0 2025-05-17 00:37:34 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:74bc7c86ff projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-191fd4fe6d calico-apiserver-74bc7c86ff-lcldf eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic12dbb93b27 [] [] }} ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" Namespace="calico-apiserver" Pod="calico-apiserver-74bc7c86ff-lcldf" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-" May 17 00:38:04.540462 env[1439]: 2025-05-17 00:38:04.256 [INFO][4008] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" Namespace="calico-apiserver" Pod="calico-apiserver-74bc7c86ff-lcldf" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:38:04.540462 env[1439]: 2025-05-17 00:38:04.304 [INFO][4029] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" HandleID="k8s-pod-network.70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:38:04.540462 env[1439]: 2025-05-17 00:38:04.304 [INFO][4029] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" HandleID="k8s-pod-network.70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003254d0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-191fd4fe6d", "pod":"calico-apiserver-74bc7c86ff-lcldf", "timestamp":"2025-05-17 00:38:04.30413059 +0000 UTC"}, Hostname:"ci-3510.3.7-n-191fd4fe6d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:38:04.540462 env[1439]: 2025-05-17 00:38:04.304 [INFO][4029] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:04.540462 env[1439]: 2025-05-17 00:38:04.315 [INFO][4029] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:04.540462 env[1439]: 2025-05-17 00:38:04.315 [INFO][4029] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-191fd4fe6d' May 17 00:38:04.540462 env[1439]: 2025-05-17 00:38:04.397 [INFO][4029] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:04.540462 env[1439]: 2025-05-17 00:38:04.409 [INFO][4029] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:04.540462 env[1439]: 2025-05-17 00:38:04.426 [INFO][4029] ipam/ipam.go 511: Trying affinity for 192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:04.540462 env[1439]: 2025-05-17 00:38:04.428 [INFO][4029] ipam/ipam.go 158: Attempting to load block cidr=192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:04.540462 env[1439]: 2025-05-17 00:38:04.431 [INFO][4029] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:04.540462 env[1439]: 2025-05-17 00:38:04.431 [INFO][4029] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.85.192/26 handle="k8s-pod-network.70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:04.540462 env[1439]: 2025-05-17 00:38:04.432 [INFO][4029] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e May 17 00:38:04.540462 env[1439]: 2025-05-17 00:38:04.443 [INFO][4029] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.85.192/26 handle="k8s-pod-network.70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:04.540462 env[1439]: 2025-05-17 00:38:04.459 [INFO][4029] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.85.195/26] block=192.168.85.192/26 handle="k8s-pod-network.70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:04.540462 env[1439]: 2025-05-17 00:38:04.459 [INFO][4029] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.85.195/26] handle="k8s-pod-network.70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:04.540462 env[1439]: 2025-05-17 00:38:04.459 [INFO][4029] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:04.540462 env[1439]: 2025-05-17 00:38:04.459 [INFO][4029] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.85.195/26] IPv6=[] ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" HandleID="k8s-pod-network.70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:38:04.541280 env[1439]: 2025-05-17 00:38:04.471 [INFO][4008] cni-plugin/k8s.go 418: Populated endpoint ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" Namespace="calico-apiserver" Pod="calico-apiserver-74bc7c86ff-lcldf" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0", GenerateName:"calico-apiserver-74bc7c86ff-", Namespace:"calico-apiserver", SelfLink:"", UID:"30df0e77-1e34-4685-80e6-9457028d7acb", ResourceVersion:"970", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74bc7c86ff", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"", Pod:"calico-apiserver-74bc7c86ff-lcldf", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic12dbb93b27", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:04.541280 env[1439]: 2025-05-17 00:38:04.471 [INFO][4008] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.85.195/32] ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" Namespace="calico-apiserver" Pod="calico-apiserver-74bc7c86ff-lcldf" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:38:04.541280 env[1439]: 2025-05-17 00:38:04.471 [INFO][4008] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic12dbb93b27 ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" Namespace="calico-apiserver" Pod="calico-apiserver-74bc7c86ff-lcldf" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:38:04.541280 env[1439]: 2025-05-17 00:38:04.483 [INFO][4008] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" Namespace="calico-apiserver" Pod="calico-apiserver-74bc7c86ff-lcldf" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:38:04.541280 env[1439]: 2025-05-17 00:38:04.484 [INFO][4008] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" Namespace="calico-apiserver" Pod="calico-apiserver-74bc7c86ff-lcldf" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0", GenerateName:"calico-apiserver-74bc7c86ff-", Namespace:"calico-apiserver", SelfLink:"", UID:"30df0e77-1e34-4685-80e6-9457028d7acb", ResourceVersion:"970", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74bc7c86ff", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e", Pod:"calico-apiserver-74bc7c86ff-lcldf", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic12dbb93b27", MAC:"f2:88:df:99:d8:9b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:04.541280 env[1439]: 2025-05-17 00:38:04.529 [INFO][4008] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" Namespace="calico-apiserver" Pod="calico-apiserver-74bc7c86ff-lcldf" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:38:04.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.553368 kernel: audit: type=1400 audit(1747442284.457:1124): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.557531 env[1439]: time="2025-05-17T00:38:04.557493469Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-z2hcl,Uid:8dfb2f5b-365c-4be9-abc4-56ee0d856953,Namespace:kube-system,Attempt:1,} returns sandbox id \"e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661\"" May 17 00:38:04.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.574037 env[1439]: time="2025-05-17T00:38:04.561260556Z" level=info msg="CreateContainer within sandbox \"e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:38:04.574037 env[1439]: time="2025-05-17T00:38:04.570288123Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:38:04.574037 env[1439]: time="2025-05-17T00:38:04.570383922Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:38:04.574037 env[1439]: time="2025-05-17T00:38:04.570413022Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:38:04.574037 env[1439]: time="2025-05-17T00:38:04.570693221Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e pid=4104 runtime=io.containerd.runc.v2 May 17 00:38:04.574405 kernel: audit: type=1400 audit(1747442284.457:1125): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.457000 audit: BPF prog-id=166 op=LOAD May 17 00:38:04.471000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4055 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:04.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534663437396237316134626136623161643466396366383266663936 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4055 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:04.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534663437396237316134626136623161643466396366383266663936 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit: BPF prog-id=167 op=LOAD May 17 00:38:04.471000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002de1c0 items=0 ppid=4055 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:04.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534663437396237316134626136623161643466396366383266663936 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit: BPF prog-id=168 op=LOAD May 17 00:38:04.471000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002de208 items=0 ppid=4055 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:04.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534663437396237316134626136623161643466396366383266663936 May 17 00:38:04.471000 audit: BPF prog-id=168 op=UNLOAD May 17 00:38:04.471000 audit: BPF prog-id=167 op=UNLOAD May 17 00:38:04.471000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { perfmon } for pid=4063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit[4063]: AVC avc: denied { bpf } for pid=4063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.471000 audit: BPF prog-id=169 op=LOAD May 17 00:38:04.471000 audit[4063]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002de618 items=0 ppid=4055 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:04.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534663437396237316134626136623161643466396366383266663936 May 17 00:38:04.593955 systemd[1]: Started cri-containerd-70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e.scope. May 17 00:38:04.602365 env[1439]: time="2025-05-17T00:38:04.601118811Z" level=info msg="CreateContainer within sandbox \"e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"23bef35066b518a0aa190458b7755ddba9b753351590b704361118f4846673a0\"" May 17 00:38:04.602520 env[1439]: time="2025-05-17T00:38:04.602491606Z" level=info msg="StartContainer for \"23bef35066b518a0aa190458b7755ddba9b753351590b704361118f4846673a0\"" May 17 00:38:04.625536 systemd[1]: Started cri-containerd-23bef35066b518a0aa190458b7755ddba9b753351590b704361118f4846673a0.scope. May 17 00:38:04.633000 audit[4127]: NETFILTER_CFG table=filter:111 family=2 entries=54 op=nft_register_chain pid=4127 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:04.633000 audit[4127]: SYSCALL arch=c000003e syscall=46 success=yes exit=29396 a0=3 a1=7ffe57192ea0 a2=0 a3=7ffe57192e8c items=0 ppid=3759 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:04.633000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:04.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.648000 audit: BPF prog-id=170 op=LOAD May 17 00:38:04.648000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.648000 audit[4133]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4055 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:04.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233626566333530363662353138613061613139303435386237373535 May 17 00:38:04.648000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.648000 audit[4133]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4055 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:04.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233626566333530363662353138613061613139303435386237373535 May 17 00:38:04.648000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.648000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.648000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.648000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.648000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.648000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.648000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.648000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.648000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.648000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.648000 audit: BPF prog-id=171 op=LOAD May 17 00:38:04.648000 audit[4133]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032fd60 items=0 ppid=4055 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:04.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233626566333530363662353138613061613139303435386237373535 May 17 00:38:04.649000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.649000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.649000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.649000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.649000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.649000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.649000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.649000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.649000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.649000 audit: BPF prog-id=172 op=LOAD May 17 00:38:04.649000 audit[4133]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032fda8 items=0 ppid=4055 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:04.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233626566333530363662353138613061613139303435386237373535 May 17 00:38:04.649000 audit: BPF prog-id=172 op=UNLOAD May 17 00:38:04.649000 audit: BPF prog-id=171 op=UNLOAD May 17 00:38:04.649000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.649000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.649000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.649000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.649000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.649000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.649000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.649000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.649000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.649000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.649000 audit: BPF prog-id=173 op=LOAD May 17 00:38:04.649000 audit[4133]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00037c1b8 items=0 ppid=4055 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:04.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233626566333530363662353138613061613139303435386237373535 May 17 00:38:04.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.652000 audit: BPF prog-id=174 op=LOAD May 17 00:38:04.653000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.653000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4104 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:04.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730656236313434366533386165616336346362663131663738373136 May 17 00:38:04.653000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.653000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4104 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:04.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730656236313434366533386165616336346362663131663738373136 May 17 00:38:04.653000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.653000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.653000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.653000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.653000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.653000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.653000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.653000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.653000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.653000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.653000 audit: BPF prog-id=175 op=LOAD May 17 00:38:04.653000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001e5a30 items=0 ppid=4104 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:04.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730656236313434366533386165616336346362663131663738373136 May 17 00:38:04.654000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.654000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.654000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.654000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.654000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.654000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.654000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.654000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.654000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.654000 audit: BPF prog-id=176 op=LOAD May 17 00:38:04.654000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001e5a78 items=0 ppid=4104 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:04.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730656236313434366533386165616336346362663131663738373136 May 17 00:38:04.654000 audit: BPF prog-id=176 op=UNLOAD May 17 00:38:04.654000 audit: BPF prog-id=175 op=UNLOAD May 17 00:38:04.654000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.654000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.654000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.654000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.654000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.654000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.654000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.654000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.654000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.654000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:04.654000 audit: BPF prog-id=177 op=LOAD May 17 00:38:04.654000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001e5e88 items=0 ppid=4104 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:04.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730656236313434366533386165616336346362663131663738373136 May 17 00:38:04.675590 env[1439]: time="2025-05-17T00:38:04.675536140Z" level=info msg="StartContainer for \"23bef35066b518a0aa190458b7755ddba9b753351590b704361118f4846673a0\" returns successfully" May 17 00:38:04.686000 audit[4151]: AVC avc: denied { getattr } for pid=4151 comm="coredns" path="cgroup:[4026532731]" dev="nsfs" ino=4026532731 scontext=system_u:system_r:svirt_lxc_net_t:s0:c314,c705 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:38:04.686000 audit[4151]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00014a900 a2=c00049b558 a3=0 items=0 ppid=4055 pid=4151 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c314,c705 key=(null) May 17 00:38:04.686000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:38:04.702638 env[1439]: time="2025-05-17T00:38:04.702591642Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74bc7c86ff-lcldf,Uid:30df0e77-1e34-4685-80e6-9457028d7acb,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e\"" May 17 00:38:04.704297 env[1439]: time="2025-05-17T00:38:04.704259136Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:38:04.770203 kubelet[2441]: I0517 00:38:04.770154 2441 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:38:04.991527 env[1439]: time="2025-05-17T00:38:04.990964895Z" level=info msg="StopPodSandbox for \"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\"" May 17 00:38:05.067728 env[1439]: 2025-05-17 00:38:05.038 [INFO][4230] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" May 17 00:38:05.067728 env[1439]: 2025-05-17 00:38:05.038 [INFO][4230] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" iface="eth0" netns="/var/run/netns/cni-fbf2c6d5-e273-05dc-eabd-1b3eddb61f21" May 17 00:38:05.067728 env[1439]: 2025-05-17 00:38:05.038 [INFO][4230] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" iface="eth0" netns="/var/run/netns/cni-fbf2c6d5-e273-05dc-eabd-1b3eddb61f21" May 17 00:38:05.067728 env[1439]: 2025-05-17 00:38:05.038 [INFO][4230] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" iface="eth0" netns="/var/run/netns/cni-fbf2c6d5-e273-05dc-eabd-1b3eddb61f21" May 17 00:38:05.067728 env[1439]: 2025-05-17 00:38:05.038 [INFO][4230] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" May 17 00:38:05.067728 env[1439]: 2025-05-17 00:38:05.038 [INFO][4230] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" May 17 00:38:05.067728 env[1439]: 2025-05-17 00:38:05.058 [INFO][4237] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" HandleID="k8s-pod-network.6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:38:05.067728 env[1439]: 2025-05-17 00:38:05.058 [INFO][4237] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:05.067728 env[1439]: 2025-05-17 00:38:05.058 [INFO][4237] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:05.067728 env[1439]: 2025-05-17 00:38:05.064 [WARNING][4237] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" HandleID="k8s-pod-network.6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:38:05.067728 env[1439]: 2025-05-17 00:38:05.064 [INFO][4237] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" HandleID="k8s-pod-network.6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:38:05.067728 env[1439]: 2025-05-17 00:38:05.065 [INFO][4237] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:05.067728 env[1439]: 2025-05-17 00:38:05.066 [INFO][4230] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" May 17 00:38:05.068440 env[1439]: time="2025-05-17T00:38:05.067878020Z" level=info msg="TearDown network for sandbox \"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\" successfully" May 17 00:38:05.068440 env[1439]: time="2025-05-17T00:38:05.067932720Z" level=info msg="StopPodSandbox for \"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\" returns successfully" May 17 00:38:05.068848 env[1439]: time="2025-05-17T00:38:05.068813317Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74bc7c86ff-rst5w,Uid:f7311dad-530c-4ead-87b1-cc9be9e8f9e6,Namespace:calico-apiserver,Attempt:1,}" May 17 00:38:05.125791 systemd[1]: run-netns-cni\x2dfbf2c6d5\x2de273\x2d05dc\x2deabd\x2d1b3eddb61f21.mount: Deactivated successfully. May 17 00:38:05.204394 kubelet[2441]: I0517 00:38:05.203552 2441 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-z2hcl" podStartSLOduration=41.203528337 podStartE2EDuration="41.203528337s" podCreationTimestamp="2025-05-17 00:37:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:38:05.199372352 +0000 UTC m=+48.301164373" watchObservedRunningTime="2025-05-17 00:38:05.203528337 +0000 UTC m=+48.305320358" May 17 00:38:05.244000 audit[4264]: NETFILTER_CFG table=filter:112 family=2 entries=20 op=nft_register_rule pid=4264 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:05.244000 audit[4264]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff6af26060 a2=0 a3=7fff6af2604c items=0 ppid=2549 pid=4264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:05.244000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:05.249000 audit[4264]: NETFILTER_CFG table=nat:113 family=2 entries=14 op=nft_register_rule pid=4264 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:05.249000 audit[4264]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff6af26060 a2=0 a3=0 items=0 ppid=2549 pid=4264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:05.249000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:05.275084 systemd-networkd[1588]: calic5c2536fc78: Link UP May 17 00:38:05.278434 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic5c2536fc78: link becomes ready May 17 00:38:05.278472 systemd-networkd[1588]: calic5c2536fc78: Gained carrier May 17 00:38:05.287000 audit[4268]: NETFILTER_CFG table=filter:114 family=2 entries=17 op=nft_register_rule pid=4268 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:05.287000 audit[4268]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd1f01c390 a2=0 a3=7ffd1f01c37c items=0 ppid=2549 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:05.287000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:05.296857 env[1439]: 2025-05-17 00:38:05.147 [INFO][4243] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0 calico-apiserver-74bc7c86ff- calico-apiserver f7311dad-530c-4ead-87b1-cc9be9e8f9e6 989 0 2025-05-17 00:37:34 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:74bc7c86ff projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-191fd4fe6d calico-apiserver-74bc7c86ff-rst5w eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic5c2536fc78 [] [] }} ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" Namespace="calico-apiserver" Pod="calico-apiserver-74bc7c86ff-rst5w" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-" May 17 00:38:05.296857 env[1439]: 2025-05-17 00:38:05.147 [INFO][4243] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" Namespace="calico-apiserver" Pod="calico-apiserver-74bc7c86ff-rst5w" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:38:05.296857 env[1439]: 2025-05-17 00:38:05.171 [INFO][4256] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" HandleID="k8s-pod-network.f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:38:05.296857 env[1439]: 2025-05-17 00:38:05.171 [INFO][4256] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" HandleID="k8s-pod-network.f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9020), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-191fd4fe6d", "pod":"calico-apiserver-74bc7c86ff-rst5w", "timestamp":"2025-05-17 00:38:05.171372751 +0000 UTC"}, Hostname:"ci-3510.3.7-n-191fd4fe6d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:38:05.296857 env[1439]: 2025-05-17 00:38:05.172 [INFO][4256] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:05.296857 env[1439]: 2025-05-17 00:38:05.172 [INFO][4256] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:05.296857 env[1439]: 2025-05-17 00:38:05.172 [INFO][4256] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-191fd4fe6d' May 17 00:38:05.296857 env[1439]: 2025-05-17 00:38:05.178 [INFO][4256] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:05.296857 env[1439]: 2025-05-17 00:38:05.182 [INFO][4256] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:05.296857 env[1439]: 2025-05-17 00:38:05.217 [INFO][4256] ipam/ipam.go 511: Trying affinity for 192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:05.296857 env[1439]: 2025-05-17 00:38:05.221 [INFO][4256] ipam/ipam.go 158: Attempting to load block cidr=192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:05.296857 env[1439]: 2025-05-17 00:38:05.227 [INFO][4256] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:05.296857 env[1439]: 2025-05-17 00:38:05.227 [INFO][4256] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.85.192/26 handle="k8s-pod-network.f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:05.296857 env[1439]: 2025-05-17 00:38:05.235 [INFO][4256] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f May 17 00:38:05.296857 env[1439]: 2025-05-17 00:38:05.240 [INFO][4256] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.85.192/26 handle="k8s-pod-network.f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:05.296857 env[1439]: 2025-05-17 00:38:05.255 [INFO][4256] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.85.196/26] block=192.168.85.192/26 handle="k8s-pod-network.f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:05.296857 env[1439]: 2025-05-17 00:38:05.255 [INFO][4256] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.85.196/26] handle="k8s-pod-network.f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:05.296857 env[1439]: 2025-05-17 00:38:05.255 [INFO][4256] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:05.296857 env[1439]: 2025-05-17 00:38:05.255 [INFO][4256] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.85.196/26] IPv6=[] ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" HandleID="k8s-pod-network.f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:38:05.297825 env[1439]: 2025-05-17 00:38:05.257 [INFO][4243] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" Namespace="calico-apiserver" Pod="calico-apiserver-74bc7c86ff-rst5w" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0", GenerateName:"calico-apiserver-74bc7c86ff-", Namespace:"calico-apiserver", SelfLink:"", UID:"f7311dad-530c-4ead-87b1-cc9be9e8f9e6", ResourceVersion:"989", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74bc7c86ff", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"", Pod:"calico-apiserver-74bc7c86ff-rst5w", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic5c2536fc78", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:05.297825 env[1439]: 2025-05-17 00:38:05.257 [INFO][4243] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.85.196/32] ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" Namespace="calico-apiserver" Pod="calico-apiserver-74bc7c86ff-rst5w" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:38:05.297825 env[1439]: 2025-05-17 00:38:05.257 [INFO][4243] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic5c2536fc78 ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" Namespace="calico-apiserver" Pod="calico-apiserver-74bc7c86ff-rst5w" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:38:05.297825 env[1439]: 2025-05-17 00:38:05.279 [INFO][4243] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" Namespace="calico-apiserver" Pod="calico-apiserver-74bc7c86ff-rst5w" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:38:05.297825 env[1439]: 2025-05-17 00:38:05.280 [INFO][4243] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" Namespace="calico-apiserver" Pod="calico-apiserver-74bc7c86ff-rst5w" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0", GenerateName:"calico-apiserver-74bc7c86ff-", Namespace:"calico-apiserver", SelfLink:"", UID:"f7311dad-530c-4ead-87b1-cc9be9e8f9e6", ResourceVersion:"989", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74bc7c86ff", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f", Pod:"calico-apiserver-74bc7c86ff-rst5w", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic5c2536fc78", MAC:"36:81:f2:28:d0:56", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:05.297825 env[1439]: 2025-05-17 00:38:05.294 [INFO][4243] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" Namespace="calico-apiserver" Pod="calico-apiserver-74bc7c86ff-rst5w" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:38:05.296000 audit[4268]: NETFILTER_CFG table=nat:115 family=2 entries=35 op=nft_register_chain pid=4268 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:05.296000 audit[4268]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd1f01c390 a2=0 a3=7ffd1f01c37c items=0 ppid=2549 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:05.296000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:05.317630 env[1439]: time="2025-05-17T00:38:05.317554231Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:38:05.317783 env[1439]: time="2025-05-17T00:38:05.317637230Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:38:05.317783 env[1439]: time="2025-05-17T00:38:05.317666530Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:38:05.317881 env[1439]: time="2025-05-17T00:38:05.317800630Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f pid=4283 runtime=io.containerd.runc.v2 May 17 00:38:05.338000 audit[4300]: NETFILTER_CFG table=filter:116 family=2 entries=51 op=nft_register_chain pid=4300 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:05.338000 audit[4300]: SYSCALL arch=c000003e syscall=46 success=yes exit=27116 a0=3 a1=7ffe0852bbd0 a2=0 a3=7ffe0852bbbc items=0 ppid=3759 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:05.338000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:05.340436 systemd[1]: Started cri-containerd-f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f.scope. May 17 00:38:05.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.361000 audit: BPF prog-id=178 op=LOAD May 17 00:38:05.362000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4283 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:05.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637326264663630623966613061373462316535656634343666386264 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4283 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:05.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637326264663630623966613061373462316535656634343666386264 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit: BPF prog-id=179 op=LOAD May 17 00:38:05.362000 audit[4293]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002c3dc0 items=0 ppid=4283 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:05.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637326264663630623966613061373462316535656634343666386264 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit: BPF prog-id=180 op=LOAD May 17 00:38:05.362000 audit[4293]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002c3e08 items=0 ppid=4283 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:05.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637326264663630623966613061373462316535656634343666386264 May 17 00:38:05.362000 audit: BPF prog-id=180 op=UNLOAD May 17 00:38:05.362000 audit: BPF prog-id=179 op=UNLOAD May 17 00:38:05.362000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { perfmon } for pid=4293 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:05.362000 audit: BPF prog-id=181 op=LOAD May 17 00:38:05.362000 audit[4293]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b8218 items=0 ppid=4283 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:05.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637326264663630623966613061373462316535656634343666386264 May 17 00:38:05.405910 env[1439]: time="2025-05-17T00:38:05.405849716Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74bc7c86ff-rst5w,Uid:f7311dad-530c-4ead-87b1-cc9be9e8f9e6,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f\"" May 17 00:38:05.800533 systemd-networkd[1588]: cali47acec6d416: Gained IPv6LL May 17 00:38:05.991159 env[1439]: time="2025-05-17T00:38:05.991109232Z" level=info msg="StopPodSandbox for \"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\"" May 17 00:38:05.991643 env[1439]: time="2025-05-17T00:38:05.991602430Z" level=info msg="StopPodSandbox for \"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\"" May 17 00:38:06.137841 env[1439]: 2025-05-17 00:38:06.076 [INFO][4341] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" May 17 00:38:06.137841 env[1439]: 2025-05-17 00:38:06.076 [INFO][4341] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" iface="eth0" netns="/var/run/netns/cni-e6ebe02b-8a2a-8062-f990-75b4b31f84d6" May 17 00:38:06.137841 env[1439]: 2025-05-17 00:38:06.076 [INFO][4341] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" iface="eth0" netns="/var/run/netns/cni-e6ebe02b-8a2a-8062-f990-75b4b31f84d6" May 17 00:38:06.137841 env[1439]: 2025-05-17 00:38:06.076 [INFO][4341] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" iface="eth0" netns="/var/run/netns/cni-e6ebe02b-8a2a-8062-f990-75b4b31f84d6" May 17 00:38:06.137841 env[1439]: 2025-05-17 00:38:06.076 [INFO][4341] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" May 17 00:38:06.137841 env[1439]: 2025-05-17 00:38:06.076 [INFO][4341] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" May 17 00:38:06.137841 env[1439]: 2025-05-17 00:38:06.118 [INFO][4355] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" HandleID="k8s-pod-network.2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0" May 17 00:38:06.137841 env[1439]: 2025-05-17 00:38:06.118 [INFO][4355] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:06.137841 env[1439]: 2025-05-17 00:38:06.118 [INFO][4355] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:06.137841 env[1439]: 2025-05-17 00:38:06.126 [WARNING][4355] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" HandleID="k8s-pod-network.2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0" May 17 00:38:06.137841 env[1439]: 2025-05-17 00:38:06.126 [INFO][4355] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" HandleID="k8s-pod-network.2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0" May 17 00:38:06.137841 env[1439]: 2025-05-17 00:38:06.127 [INFO][4355] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:06.137841 env[1439]: 2025-05-17 00:38:06.128 [INFO][4341] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" May 17 00:38:06.137841 env[1439]: time="2025-05-17T00:38:06.133463234Z" level=info msg="TearDown network for sandbox \"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\" successfully" May 17 00:38:06.137841 env[1439]: time="2025-05-17T00:38:06.133538634Z" level=info msg="StopPodSandbox for \"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\" returns successfully" May 17 00:38:06.137841 env[1439]: time="2025-05-17T00:38:06.134270331Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74d588d884-vsm27,Uid:4e44aa06-40b1-4eaf-95c2-202522049069,Namespace:calico-apiserver,Attempt:1,}" May 17 00:38:06.136867 systemd[1]: run-netns-cni\x2de6ebe02b\x2d8a2a\x2d8062\x2df990\x2d75b4b31f84d6.mount: Deactivated successfully. May 17 00:38:06.149774 env[1439]: 2025-05-17 00:38:06.092 [INFO][4342] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" May 17 00:38:06.149774 env[1439]: 2025-05-17 00:38:06.092 [INFO][4342] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" iface="eth0" netns="/var/run/netns/cni-286434d6-8095-a5f0-9add-940c1744aeab" May 17 00:38:06.149774 env[1439]: 2025-05-17 00:38:06.092 [INFO][4342] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" iface="eth0" netns="/var/run/netns/cni-286434d6-8095-a5f0-9add-940c1744aeab" May 17 00:38:06.149774 env[1439]: 2025-05-17 00:38:06.094 [INFO][4342] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" iface="eth0" netns="/var/run/netns/cni-286434d6-8095-a5f0-9add-940c1744aeab" May 17 00:38:06.149774 env[1439]: 2025-05-17 00:38:06.094 [INFO][4342] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" May 17 00:38:06.149774 env[1439]: 2025-05-17 00:38:06.094 [INFO][4342] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" May 17 00:38:06.149774 env[1439]: 2025-05-17 00:38:06.130 [INFO][4361] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" HandleID="k8s-pod-network.655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0" May 17 00:38:06.149774 env[1439]: 2025-05-17 00:38:06.130 [INFO][4361] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:06.149774 env[1439]: 2025-05-17 00:38:06.131 [INFO][4361] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:06.149774 env[1439]: 2025-05-17 00:38:06.145 [WARNING][4361] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" HandleID="k8s-pod-network.655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0" May 17 00:38:06.149774 env[1439]: 2025-05-17 00:38:06.145 [INFO][4361] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" HandleID="k8s-pod-network.655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0" May 17 00:38:06.149774 env[1439]: 2025-05-17 00:38:06.147 [INFO][4361] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:06.149774 env[1439]: 2025-05-17 00:38:06.148 [INFO][4342] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" May 17 00:38:06.154983 env[1439]: time="2025-05-17T00:38:06.149946276Z" level=info msg="TearDown network for sandbox \"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\" successfully" May 17 00:38:06.154983 env[1439]: time="2025-05-17T00:38:06.149990076Z" level=info msg="StopPodSandbox for \"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\" returns successfully" May 17 00:38:06.154983 env[1439]: time="2025-05-17T00:38:06.152383268Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-695b995796-2gnrg,Uid:0275e303-b9b6-4751-bc08-2a8efdaebb11,Namespace:calico-system,Attempt:1,}" May 17 00:38:06.155938 systemd[1]: run-netns-cni\x2d286434d6\x2d8095\x2da5f0\x2d9add\x2d940c1744aeab.mount: Deactivated successfully. May 17 00:38:06.440919 systemd-networkd[1588]: calic5c2536fc78: Gained IPv6LL May 17 00:38:06.505009 systemd-networkd[1588]: calic12dbb93b27: Gained IPv6LL May 17 00:38:06.569852 systemd-networkd[1588]: cali489bebedfe3: Link UP May 17 00:38:06.574293 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:38:06.574464 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali489bebedfe3: link becomes ready May 17 00:38:06.581024 systemd-networkd[1588]: cali489bebedfe3: Gained carrier May 17 00:38:06.605513 env[1439]: 2025-05-17 00:38:06.410 [INFO][4368] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0 calico-apiserver-74d588d884- calico-apiserver 4e44aa06-40b1-4eaf-95c2-202522049069 1005 0 2025-05-17 00:37:35 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:74d588d884 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-191fd4fe6d calico-apiserver-74d588d884-vsm27 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali489bebedfe3 [] [] }} ContainerID="db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74" Namespace="calico-apiserver" Pod="calico-apiserver-74d588d884-vsm27" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-" May 17 00:38:06.605513 env[1439]: 2025-05-17 00:38:06.410 [INFO][4368] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74" Namespace="calico-apiserver" Pod="calico-apiserver-74d588d884-vsm27" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0" May 17 00:38:06.605513 env[1439]: 2025-05-17 00:38:06.514 [INFO][4393] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74" HandleID="k8s-pod-network.db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0" May 17 00:38:06.605513 env[1439]: 2025-05-17 00:38:06.514 [INFO][4393] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74" HandleID="k8s-pod-network.db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d8180), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-191fd4fe6d", "pod":"calico-apiserver-74d588d884-vsm27", "timestamp":"2025-05-17 00:38:06.514111204 +0000 UTC"}, Hostname:"ci-3510.3.7-n-191fd4fe6d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:38:06.605513 env[1439]: 2025-05-17 00:38:06.514 [INFO][4393] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:06.605513 env[1439]: 2025-05-17 00:38:06.515 [INFO][4393] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:06.605513 env[1439]: 2025-05-17 00:38:06.515 [INFO][4393] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-191fd4fe6d' May 17 00:38:06.605513 env[1439]: 2025-05-17 00:38:06.524 [INFO][4393] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:06.605513 env[1439]: 2025-05-17 00:38:06.529 [INFO][4393] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:06.605513 env[1439]: 2025-05-17 00:38:06.535 [INFO][4393] ipam/ipam.go 511: Trying affinity for 192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:06.605513 env[1439]: 2025-05-17 00:38:06.537 [INFO][4393] ipam/ipam.go 158: Attempting to load block cidr=192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:06.605513 env[1439]: 2025-05-17 00:38:06.540 [INFO][4393] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:06.605513 env[1439]: 2025-05-17 00:38:06.540 [INFO][4393] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.85.192/26 handle="k8s-pod-network.db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:06.605513 env[1439]: 2025-05-17 00:38:06.541 [INFO][4393] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74 May 17 00:38:06.605513 env[1439]: 2025-05-17 00:38:06.547 [INFO][4393] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.85.192/26 handle="k8s-pod-network.db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:06.605513 env[1439]: 2025-05-17 00:38:06.560 [INFO][4393] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.85.197/26] block=192.168.85.192/26 handle="k8s-pod-network.db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:06.605513 env[1439]: 2025-05-17 00:38:06.560 [INFO][4393] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.85.197/26] handle="k8s-pod-network.db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:06.605513 env[1439]: 2025-05-17 00:38:06.560 [INFO][4393] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:06.605513 env[1439]: 2025-05-17 00:38:06.560 [INFO][4393] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.85.197/26] IPv6=[] ContainerID="db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74" HandleID="k8s-pod-network.db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0" May 17 00:38:06.606450 env[1439]: 2025-05-17 00:38:06.562 [INFO][4368] cni-plugin/k8s.go 418: Populated endpoint ContainerID="db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74" Namespace="calico-apiserver" Pod="calico-apiserver-74d588d884-vsm27" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0", GenerateName:"calico-apiserver-74d588d884-", Namespace:"calico-apiserver", SelfLink:"", UID:"4e44aa06-40b1-4eaf-95c2-202522049069", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74d588d884", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"", Pod:"calico-apiserver-74d588d884-vsm27", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali489bebedfe3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:06.606450 env[1439]: 2025-05-17 00:38:06.562 [INFO][4368] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.85.197/32] ContainerID="db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74" Namespace="calico-apiserver" Pod="calico-apiserver-74d588d884-vsm27" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0" May 17 00:38:06.606450 env[1439]: 2025-05-17 00:38:06.563 [INFO][4368] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali489bebedfe3 ContainerID="db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74" Namespace="calico-apiserver" Pod="calico-apiserver-74d588d884-vsm27" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0" May 17 00:38:06.606450 env[1439]: 2025-05-17 00:38:06.581 [INFO][4368] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74" Namespace="calico-apiserver" Pod="calico-apiserver-74d588d884-vsm27" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0" May 17 00:38:06.606450 env[1439]: 2025-05-17 00:38:06.583 [INFO][4368] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74" Namespace="calico-apiserver" Pod="calico-apiserver-74d588d884-vsm27" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0", GenerateName:"calico-apiserver-74d588d884-", Namespace:"calico-apiserver", SelfLink:"", UID:"4e44aa06-40b1-4eaf-95c2-202522049069", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74d588d884", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74", Pod:"calico-apiserver-74d588d884-vsm27", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali489bebedfe3", MAC:"22:55:fb:1a:55:e1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:06.606450 env[1439]: 2025-05-17 00:38:06.601 [INFO][4368] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74" Namespace="calico-apiserver" Pod="calico-apiserver-74d588d884-vsm27" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0" May 17 00:38:06.658582 env[1439]: time="2025-05-17T00:38:06.658510100Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:38:06.658773 env[1439]: time="2025-05-17T00:38:06.658557700Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:38:06.658773 env[1439]: time="2025-05-17T00:38:06.658571700Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:38:06.658773 env[1439]: time="2025-05-17T00:38:06.658715599Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74 pid=4422 runtime=io.containerd.runc.v2 May 17 00:38:06.694356 systemd[1]: Started cri-containerd-db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74.scope. May 17 00:38:06.710205 systemd-networkd[1588]: calif67e189de16: Link UP May 17 00:38:06.719739 systemd-networkd[1588]: calif67e189de16: Gained carrier May 17 00:38:06.720955 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif67e189de16: link becomes ready May 17 00:38:06.756455 env[1439]: 2025-05-17 00:38:06.443 [INFO][4381] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0 calico-kube-controllers-695b995796- calico-system 0275e303-b9b6-4751-bc08-2a8efdaebb11 1006 0 2025-05-17 00:37:38 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:695b995796 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.7-n-191fd4fe6d calico-kube-controllers-695b995796-2gnrg eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calif67e189de16 [] [] }} ContainerID="cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd" Namespace="calico-system" Pod="calico-kube-controllers-695b995796-2gnrg" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-" May 17 00:38:06.756455 env[1439]: 2025-05-17 00:38:06.444 [INFO][4381] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd" Namespace="calico-system" Pod="calico-kube-controllers-695b995796-2gnrg" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0" May 17 00:38:06.756455 env[1439]: 2025-05-17 00:38:06.537 [INFO][4399] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd" HandleID="k8s-pod-network.cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0" May 17 00:38:06.756455 env[1439]: 2025-05-17 00:38:06.537 [INFO][4399] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd" HandleID="k8s-pod-network.cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000235020), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-191fd4fe6d", "pod":"calico-kube-controllers-695b995796-2gnrg", "timestamp":"2025-05-17 00:38:06.537766122 +0000 UTC"}, Hostname:"ci-3510.3.7-n-191fd4fe6d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:38:06.756455 env[1439]: 2025-05-17 00:38:06.538 [INFO][4399] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:06.756455 env[1439]: 2025-05-17 00:38:06.560 [INFO][4399] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:06.756455 env[1439]: 2025-05-17 00:38:06.561 [INFO][4399] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-191fd4fe6d' May 17 00:38:06.756455 env[1439]: 2025-05-17 00:38:06.626 [INFO][4399] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:06.756455 env[1439]: 2025-05-17 00:38:06.634 [INFO][4399] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:06.756455 env[1439]: 2025-05-17 00:38:06.649 [INFO][4399] ipam/ipam.go 511: Trying affinity for 192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:06.756455 env[1439]: 2025-05-17 00:38:06.652 [INFO][4399] ipam/ipam.go 158: Attempting to load block cidr=192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:06.756455 env[1439]: 2025-05-17 00:38:06.665 [INFO][4399] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:06.756455 env[1439]: 2025-05-17 00:38:06.665 [INFO][4399] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.85.192/26 handle="k8s-pod-network.cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:06.756455 env[1439]: 2025-05-17 00:38:06.667 [INFO][4399] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd May 17 00:38:06.756455 env[1439]: 2025-05-17 00:38:06.680 [INFO][4399] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.85.192/26 handle="k8s-pod-network.cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:06.756455 env[1439]: 2025-05-17 00:38:06.703 [INFO][4399] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.85.198/26] block=192.168.85.192/26 handle="k8s-pod-network.cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:06.756455 env[1439]: 2025-05-17 00:38:06.703 [INFO][4399] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.85.198/26] handle="k8s-pod-network.cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:06.756455 env[1439]: 2025-05-17 00:38:06.703 [INFO][4399] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:06.756455 env[1439]: 2025-05-17 00:38:06.703 [INFO][4399] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.85.198/26] IPv6=[] ContainerID="cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd" HandleID="k8s-pod-network.cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0" May 17 00:38:06.757401 env[1439]: 2025-05-17 00:38:06.705 [INFO][4381] cni-plugin/k8s.go 418: Populated endpoint ContainerID="cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd" Namespace="calico-system" Pod="calico-kube-controllers-695b995796-2gnrg" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0", GenerateName:"calico-kube-controllers-695b995796-", Namespace:"calico-system", SelfLink:"", UID:"0275e303-b9b6-4751-bc08-2a8efdaebb11", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"695b995796", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"", Pod:"calico-kube-controllers-695b995796-2gnrg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.85.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif67e189de16", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:06.757401 env[1439]: 2025-05-17 00:38:06.705 [INFO][4381] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.85.198/32] ContainerID="cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd" Namespace="calico-system" Pod="calico-kube-controllers-695b995796-2gnrg" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0" May 17 00:38:06.757401 env[1439]: 2025-05-17 00:38:06.705 [INFO][4381] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif67e189de16 ContainerID="cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd" Namespace="calico-system" Pod="calico-kube-controllers-695b995796-2gnrg" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0" May 17 00:38:06.757401 env[1439]: 2025-05-17 00:38:06.721 [INFO][4381] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd" Namespace="calico-system" Pod="calico-kube-controllers-695b995796-2gnrg" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0" May 17 00:38:06.757401 env[1439]: 2025-05-17 00:38:06.721 [INFO][4381] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd" Namespace="calico-system" Pod="calico-kube-controllers-695b995796-2gnrg" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0", GenerateName:"calico-kube-controllers-695b995796-", Namespace:"calico-system", SelfLink:"", UID:"0275e303-b9b6-4751-bc08-2a8efdaebb11", ResourceVersion:"1006", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"695b995796", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd", Pod:"calico-kube-controllers-695b995796-2gnrg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.85.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif67e189de16", MAC:"fa:a2:53:0d:70:61", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:06.757401 env[1439]: 2025-05-17 00:38:06.754 [INFO][4381] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd" Namespace="calico-system" Pod="calico-kube-controllers-695b995796-2gnrg" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0" May 17 00:38:06.809886 env[1439]: time="2025-05-17T00:38:06.809817372Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:38:06.810052 env[1439]: time="2025-05-17T00:38:06.809889971Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:38:06.810052 env[1439]: time="2025-05-17T00:38:06.809916771Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:38:06.810170 env[1439]: time="2025-05-17T00:38:06.810095571Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd pid=4457 runtime=io.containerd.runc.v2 May 17 00:38:06.848819 systemd[1]: Started cri-containerd-cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd.scope. May 17 00:38:06.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.871000 audit: BPF prog-id=182 op=LOAD May 17 00:38:06.872000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.872000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4422 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:06.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462343065613965616630306331636130653035656661303332303562 May 17 00:38:06.873000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.873000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4422 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:06.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462343065613965616630306331636130653035656661303332303562 May 17 00:38:06.874000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.874000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.874000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.874000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.874000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.874000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.874000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.874000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.874000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.874000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.874000 audit: BPF prog-id=183 op=LOAD May 17 00:38:06.874000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003897c0 items=0 ppid=4422 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:06.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462343065613965616630306331636130653035656661303332303562 May 17 00:38:06.874000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.874000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.874000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.874000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.874000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.874000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.874000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.874000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.874000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.874000 audit: BPF prog-id=184 op=LOAD May 17 00:38:06.874000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000389808 items=0 ppid=4422 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:06.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462343065613965616630306331636130653035656661303332303562 May 17 00:38:06.875000 audit: BPF prog-id=184 op=UNLOAD May 17 00:38:06.875000 audit: BPF prog-id=183 op=UNLOAD May 17 00:38:06.875000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.875000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.875000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.875000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.875000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.875000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.875000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.875000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.875000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.875000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.875000 audit: BPF prog-id=185 op=LOAD May 17 00:38:06.875000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000389c18 items=0 ppid=4422 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:06.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462343065613965616630306331636130653035656661303332303562 May 17 00:38:06.917000 audit[4489]: NETFILTER_CFG table=filter:117 family=2 entries=51 op=nft_register_chain pid=4489 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:06.917000 audit[4489]: SYSCALL arch=c000003e syscall=46 success=yes exit=27100 a0=3 a1=7ffcee00dc80 a2=0 a3=7ffcee00dc6c items=0 ppid=3759 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:06.917000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:06.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.923000 audit: BPF prog-id=186 op=LOAD May 17 00:38:06.924000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.924000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4457 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:06.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362343539626661663765316135376663633537616232616564663839 May 17 00:38:06.924000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.924000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4457 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:06.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362343539626661663765316135376663633537616232616564663839 May 17 00:38:06.925000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.925000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.925000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.925000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.925000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.925000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.925000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.925000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.925000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.925000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.925000 audit: BPF prog-id=187 op=LOAD May 17 00:38:06.925000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a0500 items=0 ppid=4457 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:06.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362343539626661663765316135376663633537616232616564663839 May 17 00:38:06.926000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.926000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.926000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.926000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.926000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.926000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.926000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.926000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.926000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.926000 audit: BPF prog-id=188 op=LOAD May 17 00:38:06.926000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a0548 items=0 ppid=4457 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:06.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362343539626661663765316135376663633537616232616564663839 May 17 00:38:06.928000 audit: BPF prog-id=188 op=UNLOAD May 17 00:38:06.928000 audit: BPF prog-id=187 op=UNLOAD May 17 00:38:06.928000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.928000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.928000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.928000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.928000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.928000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.928000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.928000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.928000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.928000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:06.928000 audit: BPF prog-id=189 op=LOAD May 17 00:38:06.928000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a0958 items=0 ppid=4457 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:06.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362343539626661663765316135376663633537616232616564663839 May 17 00:38:06.935221 env[1439]: time="2025-05-17T00:38:06.935183134Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74d588d884-vsm27,Uid:4e44aa06-40b1-4eaf-95c2-202522049069,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74\"" May 17 00:38:06.983000 audit[4498]: NETFILTER_CFG table=filter:118 family=2 entries=44 op=nft_register_chain pid=4498 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:06.992368 env[1439]: time="2025-05-17T00:38:06.992011835Z" level=info msg="StopPodSandbox for \"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\"" May 17 00:38:06.993314 env[1439]: time="2025-05-17T00:38:06.993279131Z" level=info msg="StopPodSandbox for \"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\"" May 17 00:38:06.983000 audit[4498]: SYSCALL arch=c000003e syscall=46 success=yes exit=21920 a0=3 a1=7ffffaceaee0 a2=0 a3=7ffffaceaecc items=0 ppid=3759 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:06.983000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:06.998568 env[1439]: time="2025-05-17T00:38:06.997699215Z" level=info msg="StopPodSandbox for \"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\"" May 17 00:38:07.023414 env[1439]: time="2025-05-17T00:38:07.022885129Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-695b995796-2gnrg,Uid:0275e303-b9b6-4751-bc08-2a8efdaebb11,Namespace:calico-system,Attempt:1,} returns sandbox id \"cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd\"" May 17 00:38:07.286254 env[1439]: 2025-05-17 00:38:07.212 [INFO][4541] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" May 17 00:38:07.286254 env[1439]: 2025-05-17 00:38:07.217 [INFO][4541] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" iface="eth0" netns="/var/run/netns/cni-3f9e9a41-39df-bc74-8d13-59138eefa347" May 17 00:38:07.286254 env[1439]: 2025-05-17 00:38:07.217 [INFO][4541] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" iface="eth0" netns="/var/run/netns/cni-3f9e9a41-39df-bc74-8d13-59138eefa347" May 17 00:38:07.286254 env[1439]: 2025-05-17 00:38:07.217 [INFO][4541] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" iface="eth0" netns="/var/run/netns/cni-3f9e9a41-39df-bc74-8d13-59138eefa347" May 17 00:38:07.286254 env[1439]: 2025-05-17 00:38:07.217 [INFO][4541] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" May 17 00:38:07.286254 env[1439]: 2025-05-17 00:38:07.217 [INFO][4541] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" May 17 00:38:07.286254 env[1439]: 2025-05-17 00:38:07.252 [INFO][4560] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" HandleID="k8s-pod-network.10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0" May 17 00:38:07.286254 env[1439]: 2025-05-17 00:38:07.252 [INFO][4560] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:07.286254 env[1439]: 2025-05-17 00:38:07.253 [INFO][4560] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:07.286254 env[1439]: 2025-05-17 00:38:07.262 [WARNING][4560] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" HandleID="k8s-pod-network.10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0" May 17 00:38:07.286254 env[1439]: 2025-05-17 00:38:07.262 [INFO][4560] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" HandleID="k8s-pod-network.10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0" May 17 00:38:07.286254 env[1439]: 2025-05-17 00:38:07.264 [INFO][4560] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:07.286254 env[1439]: 2025-05-17 00:38:07.272 [INFO][4541] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" May 17 00:38:07.286254 env[1439]: time="2025-05-17T00:38:07.277176858Z" level=info msg="TearDown network for sandbox \"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\" successfully" May 17 00:38:07.286254 env[1439]: time="2025-05-17T00:38:07.277226058Z" level=info msg="StopPodSandbox for \"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\" returns successfully" May 17 00:38:07.286254 env[1439]: time="2025-05-17T00:38:07.277984555Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-jjw7b,Uid:1bd08ff5-79c3-4229-a51c-edcb14417442,Namespace:kube-system,Attempt:1,}" May 17 00:38:07.280777 systemd[1]: run-netns-cni\x2d3f9e9a41\x2d39df\x2dbc74\x2d8d13\x2d59138eefa347.mount: Deactivated successfully. May 17 00:38:07.302269 env[1439]: 2025-05-17 00:38:07.165 [INFO][4522] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" May 17 00:38:07.302269 env[1439]: 2025-05-17 00:38:07.166 [INFO][4522] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" iface="eth0" netns="/var/run/netns/cni-1f0b150a-77ff-05b6-c97b-d8820a0b4097" May 17 00:38:07.302269 env[1439]: 2025-05-17 00:38:07.168 [INFO][4522] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" iface="eth0" netns="/var/run/netns/cni-1f0b150a-77ff-05b6-c97b-d8820a0b4097" May 17 00:38:07.302269 env[1439]: 2025-05-17 00:38:07.168 [INFO][4522] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" iface="eth0" netns="/var/run/netns/cni-1f0b150a-77ff-05b6-c97b-d8820a0b4097" May 17 00:38:07.302269 env[1439]: 2025-05-17 00:38:07.168 [INFO][4522] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" May 17 00:38:07.302269 env[1439]: 2025-05-17 00:38:07.168 [INFO][4522] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" May 17 00:38:07.302269 env[1439]: 2025-05-17 00:38:07.271 [INFO][4553] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" HandleID="k8s-pod-network.8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0" May 17 00:38:07.302269 env[1439]: 2025-05-17 00:38:07.271 [INFO][4553] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:07.302269 env[1439]: 2025-05-17 00:38:07.271 [INFO][4553] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:07.302269 env[1439]: 2025-05-17 00:38:07.295 [WARNING][4553] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" HandleID="k8s-pod-network.8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0" May 17 00:38:07.302269 env[1439]: 2025-05-17 00:38:07.295 [INFO][4553] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" HandleID="k8s-pod-network.8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0" May 17 00:38:07.302269 env[1439]: 2025-05-17 00:38:07.297 [INFO][4553] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:07.302269 env[1439]: 2025-05-17 00:38:07.300 [INFO][4522] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" May 17 00:38:07.305782 systemd[1]: run-netns-cni\x2d1f0b150a\x2d77ff\x2d05b6\x2dc97b\x2dd8820a0b4097.mount: Deactivated successfully. May 17 00:38:07.307770 env[1439]: time="2025-05-17T00:38:07.307731353Z" level=info msg="TearDown network for sandbox \"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\" successfully" May 17 00:38:07.307883 env[1439]: time="2025-05-17T00:38:07.307770453Z" level=info msg="StopPodSandbox for \"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\" returns successfully" May 17 00:38:07.308531 env[1439]: time="2025-05-17T00:38:07.308500550Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fccc4,Uid:ebc6cbc0-e584-4665-8b37-7cb92cbebceb,Namespace:calico-system,Attempt:1,}" May 17 00:38:07.345482 env[1439]: 2025-05-17 00:38:07.204 [INFO][4534] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" May 17 00:38:07.345482 env[1439]: 2025-05-17 00:38:07.204 [INFO][4534] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" iface="eth0" netns="/var/run/netns/cni-26ae8bd9-f083-2ab0-aa5c-89044f51acdb" May 17 00:38:07.345482 env[1439]: 2025-05-17 00:38:07.205 [INFO][4534] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" iface="eth0" netns="/var/run/netns/cni-26ae8bd9-f083-2ab0-aa5c-89044f51acdb" May 17 00:38:07.345482 env[1439]: 2025-05-17 00:38:07.205 [INFO][4534] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" iface="eth0" netns="/var/run/netns/cni-26ae8bd9-f083-2ab0-aa5c-89044f51acdb" May 17 00:38:07.345482 env[1439]: 2025-05-17 00:38:07.205 [INFO][4534] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" May 17 00:38:07.345482 env[1439]: 2025-05-17 00:38:07.205 [INFO][4534] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" May 17 00:38:07.345482 env[1439]: 2025-05-17 00:38:07.310 [INFO][4558] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" HandleID="k8s-pod-network.3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0" May 17 00:38:07.345482 env[1439]: 2025-05-17 00:38:07.310 [INFO][4558] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:07.345482 env[1439]: 2025-05-17 00:38:07.310 [INFO][4558] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:07.345482 env[1439]: 2025-05-17 00:38:07.339 [WARNING][4558] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" HandleID="k8s-pod-network.3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0" May 17 00:38:07.345482 env[1439]: 2025-05-17 00:38:07.339 [INFO][4558] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" HandleID="k8s-pod-network.3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0" May 17 00:38:07.345482 env[1439]: 2025-05-17 00:38:07.340 [INFO][4558] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:07.345482 env[1439]: 2025-05-17 00:38:07.343 [INFO][4534] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" May 17 00:38:07.348575 env[1439]: time="2025-05-17T00:38:07.348509513Z" level=info msg="TearDown network for sandbox \"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\" successfully" May 17 00:38:07.348754 env[1439]: time="2025-05-17T00:38:07.348727913Z" level=info msg="StopPodSandbox for \"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\" returns successfully" May 17 00:38:07.351721 env[1439]: time="2025-05-17T00:38:07.349915009Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-zjc4h,Uid:68e18fcd-7ed4-4596-bb1d-407a2a0928fe,Namespace:calico-system,Attempt:1,}" May 17 00:38:07.572710 systemd-networkd[1588]: cali004dc5c2c2d: Link UP May 17 00:38:07.585449 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:38:07.585555 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali004dc5c2c2d: link becomes ready May 17 00:38:07.586705 systemd-networkd[1588]: cali004dc5c2c2d: Gained carrier May 17 00:38:07.615104 env[1439]: 2025-05-17 00:38:07.418 [INFO][4576] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0 coredns-668d6bf9bc- kube-system 1bd08ff5-79c3-4229-a51c-edcb14417442 1023 0 2025-05-17 00:37:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-191fd4fe6d coredns-668d6bf9bc-jjw7b eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali004dc5c2c2d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0" Namespace="kube-system" Pod="coredns-668d6bf9bc-jjw7b" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-" May 17 00:38:07.615104 env[1439]: 2025-05-17 00:38:07.418 [INFO][4576] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0" Namespace="kube-system" Pod="coredns-668d6bf9bc-jjw7b" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0" May 17 00:38:07.615104 env[1439]: 2025-05-17 00:38:07.516 [INFO][4602] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0" HandleID="k8s-pod-network.3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0" May 17 00:38:07.615104 env[1439]: 2025-05-17 00:38:07.517 [INFO][4602] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0" HandleID="k8s-pod-network.3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d86e0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-191fd4fe6d", "pod":"coredns-668d6bf9bc-jjw7b", "timestamp":"2025-05-17 00:38:07.51294385 +0000 UTC"}, Hostname:"ci-3510.3.7-n-191fd4fe6d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:38:07.615104 env[1439]: 2025-05-17 00:38:07.517 [INFO][4602] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:07.615104 env[1439]: 2025-05-17 00:38:07.517 [INFO][4602] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:07.615104 env[1439]: 2025-05-17 00:38:07.517 [INFO][4602] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-191fd4fe6d' May 17 00:38:07.615104 env[1439]: 2025-05-17 00:38:07.530 [INFO][4602] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.615104 env[1439]: 2025-05-17 00:38:07.537 [INFO][4602] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.615104 env[1439]: 2025-05-17 00:38:07.541 [INFO][4602] ipam/ipam.go 511: Trying affinity for 192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.615104 env[1439]: 2025-05-17 00:38:07.543 [INFO][4602] ipam/ipam.go 158: Attempting to load block cidr=192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.615104 env[1439]: 2025-05-17 00:38:07.545 [INFO][4602] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.615104 env[1439]: 2025-05-17 00:38:07.546 [INFO][4602] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.85.192/26 handle="k8s-pod-network.3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.615104 env[1439]: 2025-05-17 00:38:07.547 [INFO][4602] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0 May 17 00:38:07.615104 env[1439]: 2025-05-17 00:38:07.555 [INFO][4602] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.85.192/26 handle="k8s-pod-network.3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.615104 env[1439]: 2025-05-17 00:38:07.568 [INFO][4602] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.85.199/26] block=192.168.85.192/26 handle="k8s-pod-network.3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.615104 env[1439]: 2025-05-17 00:38:07.568 [INFO][4602] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.85.199/26] handle="k8s-pod-network.3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.615104 env[1439]: 2025-05-17 00:38:07.568 [INFO][4602] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:07.615104 env[1439]: 2025-05-17 00:38:07.568 [INFO][4602] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.85.199/26] IPv6=[] ContainerID="3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0" HandleID="k8s-pod-network.3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0" May 17 00:38:07.616056 env[1439]: 2025-05-17 00:38:07.570 [INFO][4576] cni-plugin/k8s.go 418: Populated endpoint ContainerID="3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0" Namespace="kube-system" Pod="coredns-668d6bf9bc-jjw7b" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"1bd08ff5-79c3-4229-a51c-edcb14417442", ResourceVersion:"1023", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"", Pod:"coredns-668d6bf9bc-jjw7b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali004dc5c2c2d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:07.616056 env[1439]: 2025-05-17 00:38:07.570 [INFO][4576] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.85.199/32] ContainerID="3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0" Namespace="kube-system" Pod="coredns-668d6bf9bc-jjw7b" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0" May 17 00:38:07.616056 env[1439]: 2025-05-17 00:38:07.570 [INFO][4576] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali004dc5c2c2d ContainerID="3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0" Namespace="kube-system" Pod="coredns-668d6bf9bc-jjw7b" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0" May 17 00:38:07.616056 env[1439]: 2025-05-17 00:38:07.590 [INFO][4576] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0" Namespace="kube-system" Pod="coredns-668d6bf9bc-jjw7b" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0" May 17 00:38:07.616056 env[1439]: 2025-05-17 00:38:07.590 [INFO][4576] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0" Namespace="kube-system" Pod="coredns-668d6bf9bc-jjw7b" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"1bd08ff5-79c3-4229-a51c-edcb14417442", ResourceVersion:"1023", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0", Pod:"coredns-668d6bf9bc-jjw7b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali004dc5c2c2d", MAC:"12:6a:c7:32:cb:ec", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:07.616056 env[1439]: 2025-05-17 00:38:07.613 [INFO][4576] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0" Namespace="kube-system" Pod="coredns-668d6bf9bc-jjw7b" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0" May 17 00:38:07.648000 audit[4644]: NETFILTER_CFG table=filter:119 family=2 entries=44 op=nft_register_chain pid=4644 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:07.648000 audit[4644]: SYSCALL arch=c000003e syscall=46 success=yes exit=21500 a0=3 a1=7ffcd956a220 a2=0 a3=7ffcd956a20c items=0 ppid=3759 pid=4644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:07.648000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:07.681425 env[1439]: time="2025-05-17T00:38:07.681296673Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:38:07.681661 env[1439]: time="2025-05-17T00:38:07.681632172Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:38:07.681767 env[1439]: time="2025-05-17T00:38:07.681743372Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:38:07.682015 env[1439]: time="2025-05-17T00:38:07.681979271Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0 pid=4653 runtime=io.containerd.runc.v2 May 17 00:38:07.693302 systemd-networkd[1588]: caliba31e42061e: Link UP May 17 00:38:07.700814 systemd-networkd[1588]: caliba31e42061e: Gained carrier May 17 00:38:07.701427 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliba31e42061e: link becomes ready May 17 00:38:07.729653 env[1439]: 2025-05-17 00:38:07.480 [INFO][4588] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0 csi-node-driver- calico-system ebc6cbc0-e584-4665-8b37-7cb92cbebceb 1021 0 2025-05-17 00:37:38 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.7-n-191fd4fe6d csi-node-driver-fccc4 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] caliba31e42061e [] [] }} ContainerID="b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e" Namespace="calico-system" Pod="csi-node-driver-fccc4" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-" May 17 00:38:07.729653 env[1439]: 2025-05-17 00:38:07.480 [INFO][4588] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e" Namespace="calico-system" Pod="csi-node-driver-fccc4" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0" May 17 00:38:07.729653 env[1439]: 2025-05-17 00:38:07.619 [INFO][4619] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e" HandleID="k8s-pod-network.b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0" May 17 00:38:07.729653 env[1439]: 2025-05-17 00:38:07.619 [INFO][4619] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e" HandleID="k8s-pod-network.b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1630), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-191fd4fe6d", "pod":"csi-node-driver-fccc4", "timestamp":"2025-05-17 00:38:07.619209086 +0000 UTC"}, Hostname:"ci-3510.3.7-n-191fd4fe6d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:38:07.729653 env[1439]: 2025-05-17 00:38:07.619 [INFO][4619] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:07.729653 env[1439]: 2025-05-17 00:38:07.619 [INFO][4619] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:07.729653 env[1439]: 2025-05-17 00:38:07.619 [INFO][4619] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-191fd4fe6d' May 17 00:38:07.729653 env[1439]: 2025-05-17 00:38:07.634 [INFO][4619] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.729653 env[1439]: 2025-05-17 00:38:07.641 [INFO][4619] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.729653 env[1439]: 2025-05-17 00:38:07.657 [INFO][4619] ipam/ipam.go 511: Trying affinity for 192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.729653 env[1439]: 2025-05-17 00:38:07.659 [INFO][4619] ipam/ipam.go 158: Attempting to load block cidr=192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.729653 env[1439]: 2025-05-17 00:38:07.661 [INFO][4619] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.729653 env[1439]: 2025-05-17 00:38:07.662 [INFO][4619] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.85.192/26 handle="k8s-pod-network.b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.729653 env[1439]: 2025-05-17 00:38:07.663 [INFO][4619] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e May 17 00:38:07.729653 env[1439]: 2025-05-17 00:38:07.669 [INFO][4619] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.85.192/26 handle="k8s-pod-network.b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.729653 env[1439]: 2025-05-17 00:38:07.683 [INFO][4619] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.85.200/26] block=192.168.85.192/26 handle="k8s-pod-network.b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.729653 env[1439]: 2025-05-17 00:38:07.683 [INFO][4619] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.85.200/26] handle="k8s-pod-network.b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.729653 env[1439]: 2025-05-17 00:38:07.683 [INFO][4619] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:07.729653 env[1439]: 2025-05-17 00:38:07.683 [INFO][4619] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.85.200/26] IPv6=[] ContainerID="b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e" HandleID="k8s-pod-network.b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0" May 17 00:38:07.736983 env[1439]: 2025-05-17 00:38:07.685 [INFO][4588] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e" Namespace="calico-system" Pod="csi-node-driver-fccc4" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ebc6cbc0-e584-4665-8b37-7cb92cbebceb", ResourceVersion:"1021", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"", Pod:"csi-node-driver-fccc4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.85.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliba31e42061e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:07.736983 env[1439]: 2025-05-17 00:38:07.686 [INFO][4588] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.85.200/32] ContainerID="b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e" Namespace="calico-system" Pod="csi-node-driver-fccc4" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0" May 17 00:38:07.736983 env[1439]: 2025-05-17 00:38:07.686 [INFO][4588] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliba31e42061e ContainerID="b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e" Namespace="calico-system" Pod="csi-node-driver-fccc4" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0" May 17 00:38:07.736983 env[1439]: 2025-05-17 00:38:07.701 [INFO][4588] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e" Namespace="calico-system" Pod="csi-node-driver-fccc4" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0" May 17 00:38:07.736983 env[1439]: 2025-05-17 00:38:07.702 [INFO][4588] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e" Namespace="calico-system" Pod="csi-node-driver-fccc4" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ebc6cbc0-e584-4665-8b37-7cb92cbebceb", ResourceVersion:"1021", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e", Pod:"csi-node-driver-fccc4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.85.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliba31e42061e", MAC:"e2:a2:e5:08:16:33", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:07.736983 env[1439]: 2025-05-17 00:38:07.721 [INFO][4588] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e" Namespace="calico-system" Pod="csi-node-driver-fccc4" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0" May 17 00:38:07.733885 systemd[1]: Started cri-containerd-3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0.scope. May 17 00:38:07.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.750000 audit: BPF prog-id=190 op=LOAD May 17 00:38:07.751000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4653 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:07.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364323866336537663961323238616530306437303235393239633861 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4653 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:07.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364323866336537663961323238616530306437303235393239633861 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit: BPF prog-id=191 op=LOAD May 17 00:38:07.751000 audit[4664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00027ea00 items=0 ppid=4653 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:07.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364323866336537663961323238616530306437303235393239633861 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit: BPF prog-id=192 op=LOAD May 17 00:38:07.751000 audit[4664]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00027ea48 items=0 ppid=4653 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:07.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364323866336537663961323238616530306437303235393239633861 May 17 00:38:07.751000 audit: BPF prog-id=192 op=UNLOAD May 17 00:38:07.751000 audit: BPF prog-id=191 op=UNLOAD May 17 00:38:07.751000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { perfmon } for pid=4664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit[4664]: AVC avc: denied { bpf } for pid=4664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.751000 audit: BPF prog-id=193 op=LOAD May 17 00:38:07.751000 audit[4664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00027ee58 items=0 ppid=4653 pid=4664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:07.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364323866336537663961323238616530306437303235393239633861 May 17 00:38:07.805766 env[1439]: time="2025-05-17T00:38:07.797612775Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:38:07.805766 env[1439]: time="2025-05-17T00:38:07.797655175Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:38:07.805766 env[1439]: time="2025-05-17T00:38:07.797681875Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:38:07.805766 env[1439]: time="2025-05-17T00:38:07.797821574Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e pid=4693 runtime=io.containerd.runc.v2 May 17 00:38:07.817000 audit[4706]: NETFILTER_CFG table=filter:120 family=2 entries=52 op=nft_register_chain pid=4706 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:07.820498 systemd-networkd[1588]: calia310bab2f44: Link UP May 17 00:38:07.817000 audit[4706]: SYSCALL arch=c000003e syscall=46 success=yes exit=24296 a0=3 a1=7ffd40e75f30 a2=0 a3=7ffd40e75f1c items=0 ppid=3759 pid=4706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:07.817000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:07.827885 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia310bab2f44: link becomes ready May 17 00:38:07.833648 systemd-networkd[1588]: calia310bab2f44: Gained carrier May 17 00:38:07.853033 env[1439]: time="2025-05-17T00:38:07.852978785Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-jjw7b,Uid:1bd08ff5-79c3-4229-a51c-edcb14417442,Namespace:kube-system,Attempt:1,} returns sandbox id \"3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0\"" May 17 00:38:07.861288 env[1439]: time="2025-05-17T00:38:07.861245757Z" level=info msg="CreateContainer within sandbox \"3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:38:07.870740 systemd[1]: Started cri-containerd-b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e.scope. May 17 00:38:07.886682 env[1439]: 2025-05-17 00:38:07.535 [INFO][4606] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0 goldmane-78d55f7ddc- calico-system 68e18fcd-7ed4-4596-bb1d-407a2a0928fe 1022 0 2025-05-17 00:37:37 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:78d55f7ddc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s ci-3510.3.7-n-191fd4fe6d goldmane-78d55f7ddc-zjc4h eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] calia310bab2f44 [] [] }} ContainerID="76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c" Namespace="calico-system" Pod="goldmane-78d55f7ddc-zjc4h" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-" May 17 00:38:07.886682 env[1439]: 2025-05-17 00:38:07.535 [INFO][4606] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c" Namespace="calico-system" Pod="goldmane-78d55f7ddc-zjc4h" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0" May 17 00:38:07.886682 env[1439]: 2025-05-17 00:38:07.655 [INFO][4629] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c" HandleID="k8s-pod-network.76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0" May 17 00:38:07.886682 env[1439]: 2025-05-17 00:38:07.655 [INFO][4629] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c" HandleID="k8s-pod-network.76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1630), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-191fd4fe6d", "pod":"goldmane-78d55f7ddc-zjc4h", "timestamp":"2025-05-17 00:38:07.655548762 +0000 UTC"}, Hostname:"ci-3510.3.7-n-191fd4fe6d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:38:07.886682 env[1439]: 2025-05-17 00:38:07.656 [INFO][4629] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:07.886682 env[1439]: 2025-05-17 00:38:07.683 [INFO][4629] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:07.886682 env[1439]: 2025-05-17 00:38:07.683 [INFO][4629] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-191fd4fe6d' May 17 00:38:07.886682 env[1439]: 2025-05-17 00:38:07.738 [INFO][4629] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.886682 env[1439]: 2025-05-17 00:38:07.746 [INFO][4629] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.886682 env[1439]: 2025-05-17 00:38:07.763 [INFO][4629] ipam/ipam.go 511: Trying affinity for 192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.886682 env[1439]: 2025-05-17 00:38:07.764 [INFO][4629] ipam/ipam.go 158: Attempting to load block cidr=192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.886682 env[1439]: 2025-05-17 00:38:07.768 [INFO][4629] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.886682 env[1439]: 2025-05-17 00:38:07.768 [INFO][4629] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.85.192/26 handle="k8s-pod-network.76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.886682 env[1439]: 2025-05-17 00:38:07.772 [INFO][4629] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c May 17 00:38:07.886682 env[1439]: 2025-05-17 00:38:07.782 [INFO][4629] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.85.192/26 handle="k8s-pod-network.76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.886682 env[1439]: 2025-05-17 00:38:07.801 [INFO][4629] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.85.201/26] block=192.168.85.192/26 handle="k8s-pod-network.76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.886682 env[1439]: 2025-05-17 00:38:07.801 [INFO][4629] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.85.201/26] handle="k8s-pod-network.76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:07.886682 env[1439]: 2025-05-17 00:38:07.801 [INFO][4629] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:07.886682 env[1439]: 2025-05-17 00:38:07.801 [INFO][4629] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.85.201/26] IPv6=[] ContainerID="76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c" HandleID="k8s-pod-network.76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0" May 17 00:38:07.890309 env[1439]: 2025-05-17 00:38:07.814 [INFO][4606] cni-plugin/k8s.go 418: Populated endpoint ContainerID="76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c" Namespace="calico-system" Pod="goldmane-78d55f7ddc-zjc4h" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"68e18fcd-7ed4-4596-bb1d-407a2a0928fe", ResourceVersion:"1022", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"", Pod:"goldmane-78d55f7ddc-zjc4h", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.85.201/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calia310bab2f44", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:07.890309 env[1439]: 2025-05-17 00:38:07.814 [INFO][4606] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.85.201/32] ContainerID="76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c" Namespace="calico-system" Pod="goldmane-78d55f7ddc-zjc4h" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0" May 17 00:38:07.890309 env[1439]: 2025-05-17 00:38:07.814 [INFO][4606] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia310bab2f44 ContainerID="76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c" Namespace="calico-system" Pod="goldmane-78d55f7ddc-zjc4h" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0" May 17 00:38:07.890309 env[1439]: 2025-05-17 00:38:07.835 [INFO][4606] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c" Namespace="calico-system" Pod="goldmane-78d55f7ddc-zjc4h" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0" May 17 00:38:07.890309 env[1439]: 2025-05-17 00:38:07.836 [INFO][4606] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c" Namespace="calico-system" Pod="goldmane-78d55f7ddc-zjc4h" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"68e18fcd-7ed4-4596-bb1d-407a2a0928fe", ResourceVersion:"1022", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c", Pod:"goldmane-78d55f7ddc-zjc4h", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.85.201/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calia310bab2f44", MAC:"3a:8d:e8:98:ec:72", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:07.890309 env[1439]: 2025-05-17 00:38:07.853 [INFO][4606] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c" Namespace="calico-system" Pod="goldmane-78d55f7ddc-zjc4h" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0" May 17 00:38:07.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.902000 audit: BPF prog-id=194 op=LOAD May 17 00:38:07.903000 audit[4713]: AVC avc: denied { bpf } for pid=4713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001cdc48 a2=10 a3=1c items=0 ppid=4693 pid=4713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:07.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235356564613161613165346631383765363433366534383863656538 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { perfmon } for pid=4713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001cd6b0 a2=3c a3=c items=0 ppid=4693 pid=4713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:07.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235356564613161613165346631383765363433366534383863656538 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { bpf } for pid=4713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { bpf } for pid=4713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { bpf } for pid=4713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { perfmon } for pid=4713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { perfmon } for pid=4713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { perfmon } for pid=4713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { perfmon } for pid=4713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { perfmon } for pid=4713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { bpf } for pid=4713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { bpf } for pid=4713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit: BPF prog-id=195 op=LOAD May 17 00:38:07.903000 audit[4713]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001cd9d8 a2=78 a3=c00011b050 items=0 ppid=4693 pid=4713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:07.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235356564613161613165346631383765363433366534383863656538 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { bpf } for pid=4713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { bpf } for pid=4713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { perfmon } for pid=4713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { perfmon } for pid=4713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { perfmon } for pid=4713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { perfmon } for pid=4713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { perfmon } for pid=4713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { bpf } for pid=4713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { bpf } for pid=4713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit: BPF prog-id=196 op=LOAD May 17 00:38:07.903000 audit[4713]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001cd770 a2=78 a3=c00011b098 items=0 ppid=4693 pid=4713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:07.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235356564613161613165346631383765363433366534383863656538 May 17 00:38:07.903000 audit: BPF prog-id=196 op=UNLOAD May 17 00:38:07.903000 audit: BPF prog-id=195 op=UNLOAD May 17 00:38:07.903000 audit[4713]: AVC avc: denied { bpf } for pid=4713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { bpf } for pid=4713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { bpf } for pid=4713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { perfmon } for pid=4713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { perfmon } for pid=4713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { perfmon } for pid=4713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { perfmon } for pid=4713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { perfmon } for pid=4713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { bpf } for pid=4713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit[4713]: AVC avc: denied { bpf } for pid=4713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:07.903000 audit: BPF prog-id=197 op=LOAD May 17 00:38:07.903000 audit[4713]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001cdc30 a2=78 a3=c00011b4a8 items=0 ppid=4693 pid=4713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:07.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235356564613161613165346631383765363433366534383863656538 May 17 00:38:07.910000 audit[4738]: NETFILTER_CFG table=filter:121 family=2 entries=64 op=nft_register_chain pid=4738 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:07.910000 audit[4738]: SYSCALL arch=c000003e syscall=46 success=yes exit=31088 a0=3 a1=7ffd3c960790 a2=0 a3=7ffd3c96077c items=0 ppid=3759 pid=4738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:07.910000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:07.936759 env[1439]: time="2025-05-17T00:38:07.936680299Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fccc4,Uid:ebc6cbc0-e584-4665-8b37-7cb92cbebceb,Namespace:calico-system,Attempt:1,} returns sandbox id \"b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e\"" May 17 00:38:07.942020 env[1439]: time="2025-05-17T00:38:07.941957980Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:38:07.942157 env[1439]: time="2025-05-17T00:38:07.941998180Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:38:07.942157 env[1439]: time="2025-05-17T00:38:07.942011580Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:38:07.943885 env[1439]: time="2025-05-17T00:38:07.942161480Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c pid=4753 runtime=io.containerd.runc.v2 May 17 00:38:07.946469 env[1439]: time="2025-05-17T00:38:07.946433165Z" level=info msg="CreateContainer within sandbox \"3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"07e24e89db9c29a76b0725799e510b55aca63ebe3e6137c3806bfe8686f92a86\"" May 17 00:38:07.948555 env[1439]: time="2025-05-17T00:38:07.948526358Z" level=info msg="StartContainer for \"07e24e89db9c29a76b0725799e510b55aca63ebe3e6137c3806bfe8686f92a86\"" May 17 00:38:07.970959 systemd[1]: Started cri-containerd-76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c.scope. May 17 00:38:07.982803 systemd[1]: Started cri-containerd-07e24e89db9c29a76b0725799e510b55aca63ebe3e6137c3806bfe8686f92a86.scope. May 17 00:38:08.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.008000 audit: BPF prog-id=198 op=LOAD May 17 00:38:08.009000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4653 pid=4782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:08.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037653234653839646239633239613736623037323537393965353130 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4653 pid=4782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:08.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037653234653839646239633239613736623037323537393965353130 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit: BPF prog-id=199 op=LOAD May 17 00:38:08.009000 audit[4782]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001870b0 items=0 ppid=4653 pid=4782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:08.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037653234653839646239633239613736623037323537393965353130 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit: BPF prog-id=200 op=LOAD May 17 00:38:08.009000 audit[4782]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001870f8 items=0 ppid=4653 pid=4782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:08.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037653234653839646239633239613736623037323537393965353130 May 17 00:38:08.009000 audit: BPF prog-id=200 op=UNLOAD May 17 00:38:08.009000 audit: BPF prog-id=199 op=UNLOAD May 17 00:38:08.009000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { perfmon } for pid=4782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit[4782]: AVC avc: denied { bpf } for pid=4782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.009000 audit: BPF prog-id=201 op=LOAD May 17 00:38:08.009000 audit[4782]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000187508 items=0 ppid=4653 pid=4782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:08.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037653234653839646239633239613736623037323537393965353130 May 17 00:38:08.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.015000 audit: BPF prog-id=202 op=LOAD May 17 00:38:08.016000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.016000 audit[4765]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4753 pid=4765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:08.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736663537653631633361663137386234653639346131316631303239 May 17 00:38:08.017000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.017000 audit[4765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4753 pid=4765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:08.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736663537653631633361663137386234653639346131316631303239 May 17 00:38:08.017000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.017000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.017000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.017000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.017000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.017000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.017000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.017000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.017000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.017000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.017000 audit: BPF prog-id=203 op=LOAD May 17 00:38:08.017000 audit[4765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000305d00 items=0 ppid=4753 pid=4765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:08.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736663537653631633361663137386234653639346131316631303239 May 17 00:38:08.018000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.018000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.018000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.018000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.018000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.018000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.018000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.018000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.018000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.018000 audit: BPF prog-id=204 op=LOAD May 17 00:38:08.018000 audit[4765]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000305d48 items=0 ppid=4753 pid=4765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:08.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736663537653631633361663137386234653639346131316631303239 May 17 00:38:08.018000 audit: BPF prog-id=204 op=UNLOAD May 17 00:38:08.019000 audit: BPF prog-id=203 op=UNLOAD May 17 00:38:08.019000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.019000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.019000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.019000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.019000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.019000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.019000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.019000 audit[4765]: AVC avc: denied { perfmon } for pid=4765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.019000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.019000 audit[4765]: AVC avc: denied { bpf } for pid=4765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.019000 audit: BPF prog-id=205 op=LOAD May 17 00:38:08.019000 audit[4765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000400158 items=0 ppid=4753 pid=4765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:08.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736663537653631633361663137386234653639346131316631303239 May 17 00:38:08.053248 env[1439]: time="2025-05-17T00:38:08.053188703Z" level=info msg="StartContainer for \"07e24e89db9c29a76b0725799e510b55aca63ebe3e6137c3806bfe8686f92a86\" returns successfully" May 17 00:38:08.066000 audit[4801]: AVC avc: denied { getattr } for pid=4801 comm="coredns" path="cgroup:[4026532770]" dev="nsfs" ino=4026532770 scontext=system_u:system_r:svirt_lxc_net_t:s0:c519,c762 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:38:08.066000 audit[4801]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00014c990 a2=c0004997c8 a3=0 items=0 ppid=4653 pid=4801 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c519,c762 key=(null) May 17 00:38:08.069688 env[1439]: time="2025-05-17T00:38:08.069640548Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-zjc4h,Uid:68e18fcd-7ed4-4596-bb1d-407a2a0928fe,Namespace:calico-system,Attempt:1,} returns sandbox id \"76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c\"" May 17 00:38:08.066000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:38:08.147536 systemd[1]: run-netns-cni\x2d26ae8bd9\x2df083\x2d2ab0\x2daa5c\x2d89044f51acdb.mount: Deactivated successfully. May 17 00:38:08.232554 systemd-networkd[1588]: cali489bebedfe3: Gained IPv6LL May 17 00:38:08.254962 kubelet[2441]: I0517 00:38:08.254859 2441 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-jjw7b" podStartSLOduration=44.254835125 podStartE2EDuration="44.254835125s" podCreationTimestamp="2025-05-17 00:37:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:38:08.229239811 +0000 UTC m=+51.331031832" watchObservedRunningTime="2025-05-17 00:38:08.254835125 +0000 UTC m=+51.356627246" May 17 00:38:08.270000 audit[4827]: NETFILTER_CFG table=filter:122 family=2 entries=14 op=nft_register_rule pid=4827 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:08.270000 audit[4827]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd97853d70 a2=0 a3=7ffd97853d5c items=0 ppid=2549 pid=4827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:08.270000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:08.275000 audit[4827]: NETFILTER_CFG table=nat:123 family=2 entries=44 op=nft_register_rule pid=4827 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:08.275000 audit[4827]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd97853d70 a2=0 a3=7ffd97853d5c items=0 ppid=2549 pid=4827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:08.275000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:08.302000 audit[4829]: NETFILTER_CFG table=filter:124 family=2 entries=14 op=nft_register_rule pid=4829 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:08.302000 audit[4829]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe2df215d0 a2=0 a3=7ffe2df215bc items=0 ppid=2549 pid=4829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:08.302000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:08.312000 audit[4829]: NETFILTER_CFG table=nat:125 family=2 entries=56 op=nft_register_chain pid=4829 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:08.312000 audit[4829]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffe2df215d0 a2=0 a3=7ffe2df215bc items=0 ppid=2549 pid=4829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:08.312000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:08.744518 systemd-networkd[1588]: calif67e189de16: Gained IPv6LL May 17 00:38:08.810357 env[1439]: time="2025-05-17T00:38:08.810294558Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:08.821021 env[1439]: time="2025-05-17T00:38:08.820970822Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:08.826759 env[1439]: time="2025-05-17T00:38:08.826720303Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:08.833225 env[1439]: time="2025-05-17T00:38:08.833188381Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:08.834013 env[1439]: time="2025-05-17T00:38:08.833977579Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:38:08.836241 env[1439]: time="2025-05-17T00:38:08.836210471Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:38:08.837154 env[1439]: time="2025-05-17T00:38:08.837119568Z" level=info msg="CreateContainer within sandbox \"70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:38:08.878698 env[1439]: time="2025-05-17T00:38:08.878654329Z" level=info msg="CreateContainer within sandbox \"70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"567178a15c67aba3af1d3c3a52fcdee15e13ed155e0d9909df714c616eaa0223\"" May 17 00:38:08.879360 env[1439]: time="2025-05-17T00:38:08.879306626Z" level=info msg="StartContainer for \"567178a15c67aba3af1d3c3a52fcdee15e13ed155e0d9909df714c616eaa0223\"" May 17 00:38:08.908262 systemd[1]: run-containerd-runc-k8s.io-567178a15c67aba3af1d3c3a52fcdee15e13ed155e0d9909df714c616eaa0223-runc.1g8ROD.mount: Deactivated successfully. May 17 00:38:08.917896 systemd[1]: Started cri-containerd-567178a15c67aba3af1d3c3a52fcdee15e13ed155e0d9909df714c616eaa0223.scope. May 17 00:38:08.936575 systemd-networkd[1588]: cali004dc5c2c2d: Gained IPv6LL May 17 00:38:08.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.943000 audit: BPF prog-id=206 op=LOAD May 17 00:38:08.944000 audit[4841]: AVC avc: denied { bpf } for pid=4841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4104 pid=4841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:08.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536373137386131356336376162613361663164336333613532666364 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { perfmon } for pid=4841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4104 pid=4841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:08.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536373137386131356336376162613361663164336333613532666364 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { bpf } for pid=4841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { bpf } for pid=4841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { bpf } for pid=4841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { perfmon } for pid=4841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { perfmon } for pid=4841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { perfmon } for pid=4841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { perfmon } for pid=4841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { perfmon } for pid=4841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { bpf } for pid=4841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { bpf } for pid=4841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit: BPF prog-id=207 op=LOAD May 17 00:38:08.944000 audit[4841]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000246e0 items=0 ppid=4104 pid=4841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:08.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536373137386131356336376162613361663164336333613532666364 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { bpf } for pid=4841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { bpf } for pid=4841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { perfmon } for pid=4841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { perfmon } for pid=4841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { perfmon } for pid=4841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { perfmon } for pid=4841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { perfmon } for pid=4841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { bpf } for pid=4841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { bpf } for pid=4841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit: BPF prog-id=208 op=LOAD May 17 00:38:08.944000 audit[4841]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024728 items=0 ppid=4104 pid=4841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:08.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536373137386131356336376162613361663164336333613532666364 May 17 00:38:08.944000 audit: BPF prog-id=208 op=UNLOAD May 17 00:38:08.944000 audit: BPF prog-id=207 op=UNLOAD May 17 00:38:08.944000 audit[4841]: AVC avc: denied { bpf } for pid=4841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { bpf } for pid=4841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { bpf } for pid=4841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { perfmon } for pid=4841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { perfmon } for pid=4841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { perfmon } for pid=4841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { perfmon } for pid=4841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { perfmon } for pid=4841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { bpf } for pid=4841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit[4841]: AVC avc: denied { bpf } for pid=4841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:08.944000 audit: BPF prog-id=209 op=LOAD May 17 00:38:08.944000 audit[4841]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024b38 items=0 ppid=4104 pid=4841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:08.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536373137386131356336376162613361663164336333613532666364 May 17 00:38:08.986413 env[1439]: time="2025-05-17T00:38:08.986363367Z" level=info msg="StartContainer for \"567178a15c67aba3af1d3c3a52fcdee15e13ed155e0d9909df714c616eaa0223\" returns successfully" May 17 00:38:09.176020 env[1439]: time="2025-05-17T00:38:09.175968540Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:09.181913 env[1439]: time="2025-05-17T00:38:09.181864521Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:09.186582 env[1439]: time="2025-05-17T00:38:09.186545305Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:09.192593 systemd-networkd[1588]: caliba31e42061e: Gained IPv6LL May 17 00:38:09.193775 env[1439]: time="2025-05-17T00:38:09.192615585Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:09.193775 env[1439]: time="2025-05-17T00:38:09.192883585Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:38:09.195826 env[1439]: time="2025-05-17T00:38:09.195795975Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:38:09.196627 env[1439]: time="2025-05-17T00:38:09.196595372Z" level=info msg="CreateContainer within sandbox \"f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:38:09.255098 env[1439]: time="2025-05-17T00:38:09.255033580Z" level=info msg="CreateContainer within sandbox \"f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f\"" May 17 00:38:09.255896 env[1439]: time="2025-05-17T00:38:09.255859677Z" level=info msg="StartContainer for \"eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f\"" May 17 00:38:09.296303 systemd[1]: Started cri-containerd-eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f.scope. May 17 00:38:09.391000 audit[4894]: NETFILTER_CFG table=filter:126 family=2 entries=14 op=nft_register_rule pid=4894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:09.398674 kernel: kauditd_printk_skb: 671 callbacks suppressed May 17 00:38:09.398750 kernel: audit: type=1325 audit(1747442289.391:1334): table=filter:126 family=2 entries=14 op=nft_register_rule pid=4894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:09.391000 audit[4894]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc623ff030 a2=0 a3=7ffc623ff01c items=0 ppid=2549 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:09.430370 kernel: audit: type=1300 audit(1747442289.391:1334): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc623ff030 a2=0 a3=7ffc623ff01c items=0 ppid=2549 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:09.391000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:09.442392 kernel: audit: type=1327 audit(1747442289.391:1334): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:09.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.454356 kernel: audit: type=1400 audit(1747442289.392:1335): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.478625 kernel: audit: type=1400 audit(1747442289.392:1336): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.478705 kernel: audit: type=1400 audit(1747442289.392:1337): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.490122 kernel: audit: type=1400 audit(1747442289.392:1338): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.501841 kernel: audit: type=1400 audit(1747442289.392:1339): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.515471 kernel: audit: type=1400 audit(1747442289.392:1340): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.527368 kernel: audit: type=1400 audit(1747442289.392:1341): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.392000 audit: BPF prog-id=210 op=LOAD May 17 00:38:09.408000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4283 pid=4881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:09.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561626232613532393463373230396431323935333730383566646462 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4283 pid=4881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:09.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561626232613532393463373230396431323935333730383566646462 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit: BPF prog-id=211 op=LOAD May 17 00:38:09.408000 audit[4881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003041a0 items=0 ppid=4283 pid=4881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:09.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561626232613532393463373230396431323935333730383566646462 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit: BPF prog-id=212 op=LOAD May 17 00:38:09.408000 audit[4881]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003041e8 items=0 ppid=4283 pid=4881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:09.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561626232613532393463373230396431323935333730383566646462 May 17 00:38:09.408000 audit: BPF prog-id=212 op=UNLOAD May 17 00:38:09.408000 audit: BPF prog-id=211 op=UNLOAD May 17 00:38:09.408000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { perfmon } for pid=4881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit[4881]: AVC avc: denied { bpf } for pid=4881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:09.408000 audit: BPF prog-id=213 op=LOAD May 17 00:38:09.408000 audit[4881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003045f8 items=0 ppid=4283 pid=4881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:09.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561626232613532393463373230396431323935333730383566646462 May 17 00:38:09.478000 audit[4894]: NETFILTER_CFG table=nat:127 family=2 entries=20 op=nft_register_rule pid=4894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:09.478000 audit[4894]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc623ff030 a2=0 a3=7ffc623ff01c items=0 ppid=2549 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:09.478000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:09.557183 env[1439]: time="2025-05-17T00:38:09.557130483Z" level=info msg="StartContainer for \"eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f\" returns successfully" May 17 00:38:09.576464 env[1439]: time="2025-05-17T00:38:09.576415420Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:09.583261 env[1439]: time="2025-05-17T00:38:09.583219697Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:09.589314 env[1439]: time="2025-05-17T00:38:09.589275377Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:09.593487 env[1439]: time="2025-05-17T00:38:09.593451263Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:09.593925 env[1439]: time="2025-05-17T00:38:09.593890062Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:38:09.596769 env[1439]: time="2025-05-17T00:38:09.595910655Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\"" May 17 00:38:09.597012 env[1439]: time="2025-05-17T00:38:09.596981952Z" level=info msg="CreateContainer within sandbox \"db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:38:09.640556 systemd-networkd[1588]: calia310bab2f44: Gained IPv6LL May 17 00:38:09.641927 env[1439]: time="2025-05-17T00:38:09.641885104Z" level=info msg="CreateContainer within sandbox \"db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"0d4396c94320699fbcf318c87f7a9f3545891c4b14f6e62a7dd337412a8d0e26\"" May 17 00:38:09.642852 env[1439]: time="2025-05-17T00:38:09.642821401Z" level=info msg="StartContainer for \"0d4396c94320699fbcf318c87f7a9f3545891c4b14f6e62a7dd337412a8d0e26\"" May 17 00:38:09.676218 systemd[1]: Started cri-containerd-0d4396c94320699fbcf318c87f7a9f3545891c4b14f6e62a7dd337412a8d0e26.scope. May 17 00:38:10.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.031000 audit: BPF prog-id=214 op=LOAD May 17 00:38:10.032000 audit[4915]: AVC avc: denied { bpf } for pid=4915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4422 pid=4915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:10.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064343339366339343332303639396662636633313863383766376139 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { perfmon } for pid=4915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4422 pid=4915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:10.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064343339366339343332303639396662636633313863383766376139 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { bpf } for pid=4915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { bpf } for pid=4915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { bpf } for pid=4915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { perfmon } for pid=4915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { perfmon } for pid=4915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { perfmon } for pid=4915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { perfmon } for pid=4915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { perfmon } for pid=4915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { bpf } for pid=4915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { bpf } for pid=4915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit: BPF prog-id=215 op=LOAD May 17 00:38:10.032000 audit[4915]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002cdd00 items=0 ppid=4422 pid=4915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:10.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064343339366339343332303639396662636633313863383766376139 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { bpf } for pid=4915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { bpf } for pid=4915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { perfmon } for pid=4915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { perfmon } for pid=4915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { perfmon } for pid=4915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { perfmon } for pid=4915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { perfmon } for pid=4915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { bpf } for pid=4915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { bpf } for pid=4915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit: BPF prog-id=216 op=LOAD May 17 00:38:10.032000 audit[4915]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002cdd48 items=0 ppid=4422 pid=4915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:10.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064343339366339343332303639396662636633313863383766376139 May 17 00:38:10.032000 audit: BPF prog-id=216 op=UNLOAD May 17 00:38:10.032000 audit: BPF prog-id=215 op=UNLOAD May 17 00:38:10.032000 audit[4915]: AVC avc: denied { bpf } for pid=4915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { bpf } for pid=4915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { bpf } for pid=4915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { perfmon } for pid=4915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { perfmon } for pid=4915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { perfmon } for pid=4915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { perfmon } for pid=4915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { perfmon } for pid=4915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { bpf } for pid=4915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit[4915]: AVC avc: denied { bpf } for pid=4915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:10.032000 audit: BPF prog-id=217 op=LOAD May 17 00:38:10.032000 audit[4915]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b8158 items=0 ppid=4422 pid=4915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:10.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064343339366339343332303639396662636633313863383766376139 May 17 00:38:10.225535 kubelet[2441]: I0517 00:38:10.223788 2441 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:38:10.236786 env[1439]: time="2025-05-17T00:38:10.236746956Z" level=info msg="StartContainer for \"0d4396c94320699fbcf318c87f7a9f3545891c4b14f6e62a7dd337412a8d0e26\" returns successfully" May 17 00:38:10.252670 kubelet[2441]: I0517 00:38:10.252223 2441 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-74bc7c86ff-lcldf" podStartSLOduration=32.120823469 podStartE2EDuration="36.252200806s" podCreationTimestamp="2025-05-17 00:37:34 +0000 UTC" firstStartedPulling="2025-05-17 00:38:04.703808938 +0000 UTC m=+47.805600959" lastFinishedPulling="2025-05-17 00:38:08.835186275 +0000 UTC m=+51.936978296" observedRunningTime="2025-05-17 00:38:09.246266908 +0000 UTC m=+52.348059029" watchObservedRunningTime="2025-05-17 00:38:10.252200806 +0000 UTC m=+53.353992827" May 17 00:38:10.288000 audit[4945]: NETFILTER_CFG table=filter:128 family=2 entries=14 op=nft_register_rule pid=4945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:10.288000 audit[4945]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffdbbc25d80 a2=0 a3=7ffdbbc25d6c items=0 ppid=2549 pid=4945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:10.288000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:10.294000 audit[4945]: NETFILTER_CFG table=nat:129 family=2 entries=20 op=nft_register_rule pid=4945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:10.294000 audit[4945]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdbbc25d80 a2=0 a3=7ffdbbc25d6c items=0 ppid=2549 pid=4945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:10.294000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:11.228144 kubelet[2441]: I0517 00:38:11.228103 2441 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:38:11.252540 kubelet[2441]: I0517 00:38:11.252040 2441 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-74bc7c86ff-rst5w" podStartSLOduration=33.465330214 podStartE2EDuration="37.252018884s" podCreationTimestamp="2025-05-17 00:37:34 +0000 UTC" firstStartedPulling="2025-05-17 00:38:05.407821509 +0000 UTC m=+48.509613630" lastFinishedPulling="2025-05-17 00:38:09.194510179 +0000 UTC m=+52.296302300" observedRunningTime="2025-05-17 00:38:10.252647605 +0000 UTC m=+53.354439626" watchObservedRunningTime="2025-05-17 00:38:11.252018884 +0000 UTC m=+54.353810905" May 17 00:38:11.365000 audit[4960]: NETFILTER_CFG table=filter:130 family=2 entries=14 op=nft_register_rule pid=4960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:11.365000 audit[4960]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffca5688540 a2=0 a3=7ffca568852c items=0 ppid=2549 pid=4960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:11.365000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:11.369000 audit[4960]: NETFILTER_CFG table=nat:131 family=2 entries=20 op=nft_register_rule pid=4960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:11.369000 audit[4960]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffca5688540 a2=0 a3=7ffca568852c items=0 ppid=2549 pid=4960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:11.369000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:12.230906 kubelet[2441]: I0517 00:38:12.230434 2441 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:38:12.410000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:12.410000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001f3bb80 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:38:12.410000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:12.410000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:12.410000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ca5f80 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:38:12.410000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:12.904000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:12.904000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c0122b6ba0 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:38:12.904000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:38:12.904000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:12.904000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c0122b6bd0 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:38:12.904000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:38:12.979000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:12.979000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00a237960 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:38:12.979000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:38:12.988000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:12.988000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c0099ce660 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:38:12.988000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:38:12.988000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:12.988000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c007974630 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:38:12.988000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:38:12.991000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:12.991000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c007974bd0 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:38:12.991000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:38:13.747000 audit[4893]: AVC avc: denied { watch } for pid=4893 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_37_50.4067161485/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c455,c565 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c455,c565 tclass=file permissive=0 May 17 00:38:13.747000 audit[4893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0010cb5c0 a2=fc6 a3=0 items=0 ppid=4283 pid=4893 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c455,c565 key=(null) May 17 00:38:13.747000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:38:14.196489 env[1439]: time="2025-05-17T00:38:14.196434628Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:14.205896 env[1439]: time="2025-05-17T00:38:14.205842600Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:14.211405 env[1439]: time="2025-05-17T00:38:14.211369883Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:14.215435 env[1439]: time="2025-05-17T00:38:14.215396471Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:14.215764 env[1439]: time="2025-05-17T00:38:14.215730270Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\" returns image reference \"sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50\"" May 17 00:38:14.220056 env[1439]: time="2025-05-17T00:38:14.218143063Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:38:14.240372 env[1439]: time="2025-05-17T00:38:14.239636798Z" level=info msg="CreateContainer within sandbox \"cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 17 00:38:14.286176 env[1439]: time="2025-05-17T00:38:14.286122158Z" level=info msg="CreateContainer within sandbox \"cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"16152d2ae5a50bcbce2b59da84611f8e999414e7a82e1a35ef4f131b958df4b5\"" May 17 00:38:14.286953 env[1439]: time="2025-05-17T00:38:14.286909356Z" level=info msg="StartContainer for \"16152d2ae5a50bcbce2b59da84611f8e999414e7a82e1a35ef4f131b958df4b5\"" May 17 00:38:14.327382 systemd[1]: Started cri-containerd-16152d2ae5a50bcbce2b59da84611f8e999414e7a82e1a35ef4f131b958df4b5.scope. May 17 00:38:14.422533 kernel: kauditd_printk_skb: 149 callbacks suppressed May 17 00:38:14.422652 kernel: audit: type=1400 audit(1747442294.403:1385): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.437369 kernel: audit: type=1400 audit(1747442294.403:1386): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.450763 kernel: audit: type=1400 audit(1747442294.403:1387): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.477134 kernel: audit: type=1400 audit(1747442294.403:1388): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.477229 kernel: audit: type=1400 audit(1747442294.403:1389): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.501080 kernel: audit: type=1400 audit(1747442294.403:1390): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.501175 kernel: audit: type=1400 audit(1747442294.403:1391): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.512963 kernel: audit: type=1400 audit(1747442294.403:1392): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.538045 kernel: audit: type=1400 audit(1747442294.403:1393): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.538120 kernel: audit: type=1400 audit(1747442294.403:1394): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.403000 audit: BPF prog-id=218 op=LOAD May 17 00:38:14.421000 audit[4974]: AVC avc: denied { bpf } for pid=4974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.421000 audit[4974]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=4457 pid=4974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:14.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136313532643261653561353062636263653262353964613834363131 May 17 00:38:14.421000 audit[4974]: AVC avc: denied { perfmon } for pid=4974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.421000 audit[4974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=4457 pid=4974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:14.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136313532643261653561353062636263653262353964613834363131 May 17 00:38:14.421000 audit[4974]: AVC avc: denied { bpf } for pid=4974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.421000 audit[4974]: AVC avc: denied { bpf } for pid=4974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.421000 audit[4974]: AVC avc: denied { bpf } for pid=4974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.421000 audit[4974]: AVC avc: denied { perfmon } for pid=4974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.421000 audit[4974]: AVC avc: denied { perfmon } for pid=4974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.421000 audit[4974]: AVC avc: denied { perfmon } for pid=4974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.421000 audit[4974]: AVC avc: denied { perfmon } for pid=4974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.421000 audit[4974]: AVC avc: denied { perfmon } for pid=4974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.421000 audit[4974]: AVC avc: denied { bpf } for pid=4974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.421000 audit[4974]: AVC avc: denied { bpf } for pid=4974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.421000 audit: BPF prog-id=219 op=LOAD May 17 00:38:14.421000 audit[4974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c000308540 items=0 ppid=4457 pid=4974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:14.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136313532643261653561353062636263653262353964613834363131 May 17 00:38:14.422000 audit[4974]: AVC avc: denied { bpf } for pid=4974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.422000 audit[4974]: AVC avc: denied { bpf } for pid=4974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.422000 audit[4974]: AVC avc: denied { perfmon } for pid=4974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.422000 audit[4974]: AVC avc: denied { perfmon } for pid=4974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.422000 audit[4974]: AVC avc: denied { perfmon } for pid=4974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.422000 audit[4974]: AVC avc: denied { perfmon } for pid=4974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.422000 audit[4974]: AVC avc: denied { perfmon } for pid=4974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.422000 audit[4974]: AVC avc: denied { bpf } for pid=4974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.422000 audit[4974]: AVC avc: denied { bpf } for pid=4974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.422000 audit: BPF prog-id=220 op=LOAD May 17 00:38:14.422000 audit[4974]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c000308588 items=0 ppid=4457 pid=4974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:14.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136313532643261653561353062636263653262353964613834363131 May 17 00:38:14.422000 audit: BPF prog-id=220 op=UNLOAD May 17 00:38:14.422000 audit: BPF prog-id=219 op=UNLOAD May 17 00:38:14.422000 audit[4974]: AVC avc: denied { bpf } for pid=4974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.422000 audit[4974]: AVC avc: denied { bpf } for pid=4974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.422000 audit[4974]: AVC avc: denied { bpf } for pid=4974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.422000 audit[4974]: AVC avc: denied { perfmon } for pid=4974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.422000 audit[4974]: AVC avc: denied { perfmon } for pid=4974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.422000 audit[4974]: AVC avc: denied { perfmon } for pid=4974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.422000 audit[4974]: AVC avc: denied { perfmon } for pid=4974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.422000 audit[4974]: AVC avc: denied { perfmon } for pid=4974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.422000 audit[4974]: AVC avc: denied { bpf } for pid=4974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.422000 audit[4974]: AVC avc: denied { bpf } for pid=4974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:14.422000 audit: BPF prog-id=221 op=LOAD May 17 00:38:14.422000 audit[4974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c000308998 items=0 ppid=4457 pid=4974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:14.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136313532643261653561353062636263653262353964613834363131 May 17 00:38:14.645536 env[1439]: time="2025-05-17T00:38:14.645480575Z" level=info msg="StartContainer for \"16152d2ae5a50bcbce2b59da84611f8e999414e7a82e1a35ef4f131b958df4b5\" returns successfully" May 17 00:38:15.276243 kubelet[2441]: I0517 00:38:15.276168 2441 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-74d588d884-vsm27" podStartSLOduration=37.622567243 podStartE2EDuration="40.27614399s" podCreationTimestamp="2025-05-17 00:37:35 +0000 UTC" firstStartedPulling="2025-05-17 00:38:06.942128509 +0000 UTC m=+50.043920530" lastFinishedPulling="2025-05-17 00:38:09.595705256 +0000 UTC m=+52.697497277" observedRunningTime="2025-05-17 00:38:11.25336378 +0000 UTC m=+54.355155901" watchObservedRunningTime="2025-05-17 00:38:15.27614399 +0000 UTC m=+58.377936111" May 17 00:38:15.277226 kubelet[2441]: I0517 00:38:15.276789 2441 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-695b995796-2gnrg" podStartSLOduration=30.086540038 podStartE2EDuration="37.276774488s" podCreationTimestamp="2025-05-17 00:37:38 +0000 UTC" firstStartedPulling="2025-05-17 00:38:07.027053515 +0000 UTC m=+50.128845636" lastFinishedPulling="2025-05-17 00:38:14.217288065 +0000 UTC m=+57.319080086" observedRunningTime="2025-05-17 00:38:15.260323237 +0000 UTC m=+58.362115358" watchObservedRunningTime="2025-05-17 00:38:15.276774488 +0000 UTC m=+58.378566509" May 17 00:38:15.577000 audit[4853]: AVC avc: denied { watch } for pid=4853 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_37_50.2202266174/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c956 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c3,c956 tclass=file permissive=0 May 17 00:38:15.577000 audit[4853]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001622040 a2=fc6 a3=0 items=0 ppid=4104 pid=4853 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c956 key=(null) May 17 00:38:15.577000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:38:15.820070 env[1439]: time="2025-05-17T00:38:15.820019780Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:15.828408 env[1439]: time="2025-05-17T00:38:15.828371655Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:15.834466 env[1439]: time="2025-05-17T00:38:15.834377637Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:15.839750 env[1439]: time="2025-05-17T00:38:15.839714022Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:15.840569 env[1439]: time="2025-05-17T00:38:15.840528719Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:38:15.843055 env[1439]: time="2025-05-17T00:38:15.843019512Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:38:15.844011 env[1439]: time="2025-05-17T00:38:15.843942009Z" level=info msg="CreateContainer within sandbox \"b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:38:15.898058 env[1439]: time="2025-05-17T00:38:15.898002849Z" level=info msg="CreateContainer within sandbox \"b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"eb9d722abb2c91c49198cbcfcd639679ad219bdb639895f63fb79f2a99f3447b\"" May 17 00:38:15.899126 env[1439]: time="2025-05-17T00:38:15.899093046Z" level=info msg="StartContainer for \"eb9d722abb2c91c49198cbcfcd639679ad219bdb639895f63fb79f2a99f3447b\"" May 17 00:38:15.928896 systemd[1]: Started cri-containerd-eb9d722abb2c91c49198cbcfcd639679ad219bdb639895f63fb79f2a99f3447b.scope. May 17 00:38:16.033000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f76c87cca28 items=0 ppid=4693 pid=5036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:16.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562396437323261626232633931633439313938636263666364363339 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit: BPF prog-id=222 op=LOAD May 17 00:38:16.033000 audit[5036]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001e7fe8 items=0 ppid=4693 pid=5036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:16.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562396437323261626232633931633439313938636263666364363339 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit: BPF prog-id=223 op=LOAD May 17 00:38:16.033000 audit[5036]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003b8038 items=0 ppid=4693 pid=5036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:16.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562396437323261626232633931633439313938636263666364363339 May 17 00:38:16.033000 audit: BPF prog-id=223 op=UNLOAD May 17 00:38:16.033000 audit: BPF prog-id=222 op=UNLOAD May 17 00:38:16.033000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { perfmon } for pid=5036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit[5036]: AVC avc: denied { bpf } for pid=5036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:16.033000 audit: BPF prog-id=224 op=LOAD May 17 00:38:16.033000 audit[5036]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003b80c8 items=0 ppid=4693 pid=5036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:16.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562396437323261626232633931633439313938636263666364363339 May 17 00:38:16.037615 env[1439]: time="2025-05-17T00:38:16.037552038Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:38:16.042064 env[1439]: time="2025-05-17T00:38:16.042015625Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:38:16.043083 kubelet[2441]: E0517 00:38:16.042315 2441 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:38:16.043083 kubelet[2441]: E0517 00:38:16.042397 2441 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:38:16.043083 kubelet[2441]: E0517 00:38:16.042730 2441 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-8r4bq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-zjc4h_calico-system(68e18fcd-7ed4-4596-bb1d-407a2a0928fe): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:38:16.043763 env[1439]: time="2025-05-17T00:38:16.043733620Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:38:16.044040 kubelet[2441]: E0517 00:38:16.043976 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-zjc4h" podUID="68e18fcd-7ed4-4596-bb1d-407a2a0928fe" May 17 00:38:16.085357 env[1439]: time="2025-05-17T00:38:16.085233099Z" level=info msg="StartContainer for \"eb9d722abb2c91c49198cbcfcd639679ad219bdb639895f63fb79f2a99f3447b\" returns successfully" May 17 00:38:16.217959 env[1439]: time="2025-05-17T00:38:16.217895013Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:38:16.228471 env[1439]: time="2025-05-17T00:38:16.228410582Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:38:16.228908 kubelet[2441]: E0517 00:38:16.228862 2441 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:38:16.229083 kubelet[2441]: E0517 00:38:16.229061 2441 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:38:16.229687 kubelet[2441]: E0517 00:38:16.229477 2441 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:390ed499d1204bf499760421b62bf110,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-fzjs4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-b8dc5df5c-7xlwx_calico-system(1be837ab-f6c8-4d7d-9976-b853d9b4b123): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:38:16.230376 env[1439]: time="2025-05-17T00:38:16.230335577Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:38:16.250782 kubelet[2441]: E0517 00:38:16.250736 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-zjc4h" podUID="68e18fcd-7ed4-4596-bb1d-407a2a0928fe" May 17 00:38:16.281956 systemd[1]: run-containerd-runc-k8s.io-16152d2ae5a50bcbce2b59da84611f8e999414e7a82e1a35ef4f131b958df4b5-runc.wE6eWI.mount: Deactivated successfully. May 17 00:38:16.398000 audit[5079]: NETFILTER_CFG table=filter:132 family=2 entries=14 op=nft_register_rule pid=5079 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:16.398000 audit[5079]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffdaf6be280 a2=0 a3=7ffdaf6be26c items=0 ppid=2549 pid=5079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:16.398000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:16.408000 audit[5079]: NETFILTER_CFG table=nat:133 family=2 entries=20 op=nft_register_rule pid=5079 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:16.408000 audit[5079]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdaf6be280 a2=0 a3=7ffdaf6be26c items=0 ppid=2549 pid=5079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:16.408000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:17.027438 env[1439]: time="2025-05-17T00:38:17.025797263Z" level=info msg="StopPodSandbox for \"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\"" May 17 00:38:17.244063 env[1439]: 2025-05-17 00:38:17.106 [WARNING][5094] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"68e18fcd-7ed4-4596-bb1d-407a2a0928fe", ResourceVersion:"1106", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c", Pod:"goldmane-78d55f7ddc-zjc4h", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.85.201/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calia310bab2f44", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:17.244063 env[1439]: 2025-05-17 00:38:17.106 [INFO][5094] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" May 17 00:38:17.244063 env[1439]: 2025-05-17 00:38:17.106 [INFO][5094] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" iface="eth0" netns="" May 17 00:38:17.244063 env[1439]: 2025-05-17 00:38:17.107 [INFO][5094] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" May 17 00:38:17.244063 env[1439]: 2025-05-17 00:38:17.107 [INFO][5094] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" May 17 00:38:17.244063 env[1439]: 2025-05-17 00:38:17.188 [INFO][5101] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" HandleID="k8s-pod-network.3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0" May 17 00:38:17.244063 env[1439]: 2025-05-17 00:38:17.188 [INFO][5101] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:17.244063 env[1439]: 2025-05-17 00:38:17.191 [INFO][5101] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:17.244063 env[1439]: 2025-05-17 00:38:17.229 [WARNING][5101] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" HandleID="k8s-pod-network.3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0" May 17 00:38:17.244063 env[1439]: 2025-05-17 00:38:17.229 [INFO][5101] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" HandleID="k8s-pod-network.3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0" May 17 00:38:17.244063 env[1439]: 2025-05-17 00:38:17.233 [INFO][5101] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:17.244063 env[1439]: 2025-05-17 00:38:17.239 [INFO][5094] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" May 17 00:38:17.244760 env[1439]: time="2025-05-17T00:38:17.244096438Z" level=info msg="TearDown network for sandbox \"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\" successfully" May 17 00:38:17.244760 env[1439]: time="2025-05-17T00:38:17.244132238Z" level=info msg="StopPodSandbox for \"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\" returns successfully" May 17 00:38:17.244878 env[1439]: time="2025-05-17T00:38:17.244844836Z" level=info msg="RemovePodSandbox for \"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\"" May 17 00:38:17.244936 env[1439]: time="2025-05-17T00:38:17.244891836Z" level=info msg="Forcibly stopping sandbox \"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\"" May 17 00:38:17.462662 env[1439]: 2025-05-17 00:38:17.380 [WARNING][5115] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"68e18fcd-7ed4-4596-bb1d-407a2a0928fe", ResourceVersion:"1106", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"76f57e61c3af178b4e694a11f10297b924f0936cf0998707bb2a14c706091a2c", Pod:"goldmane-78d55f7ddc-zjc4h", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.85.201/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calia310bab2f44", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:17.462662 env[1439]: 2025-05-17 00:38:17.380 [INFO][5115] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" May 17 00:38:17.462662 env[1439]: 2025-05-17 00:38:17.380 [INFO][5115] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" iface="eth0" netns="" May 17 00:38:17.462662 env[1439]: 2025-05-17 00:38:17.380 [INFO][5115] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" May 17 00:38:17.462662 env[1439]: 2025-05-17 00:38:17.380 [INFO][5115] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" May 17 00:38:17.462662 env[1439]: 2025-05-17 00:38:17.446 [INFO][5122] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" HandleID="k8s-pod-network.3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0" May 17 00:38:17.462662 env[1439]: 2025-05-17 00:38:17.447 [INFO][5122] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:17.462662 env[1439]: 2025-05-17 00:38:17.447 [INFO][5122] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:17.462662 env[1439]: 2025-05-17 00:38:17.454 [WARNING][5122] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" HandleID="k8s-pod-network.3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0" May 17 00:38:17.462662 env[1439]: 2025-05-17 00:38:17.454 [INFO][5122] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" HandleID="k8s-pod-network.3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-goldmane--78d55f7ddc--zjc4h-eth0" May 17 00:38:17.462662 env[1439]: 2025-05-17 00:38:17.459 [INFO][5122] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:17.462662 env[1439]: 2025-05-17 00:38:17.461 [INFO][5115] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd" May 17 00:38:17.463501 env[1439]: time="2025-05-17T00:38:17.463451411Z" level=info msg="TearDown network for sandbox \"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\" successfully" May 17 00:38:17.546127 env[1439]: time="2025-05-17T00:38:17.546067374Z" level=info msg="RemovePodSandbox \"3c58caeef2bb0d639d36c25492acaab138c3b9dfc15a036c646c84e13536ffdd\" returns successfully" May 17 00:38:17.547064 env[1439]: time="2025-05-17T00:38:17.547023972Z" level=info msg="StopPodSandbox for \"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\"" May 17 00:38:17.728840 env[1439]: 2025-05-17 00:38:17.643 [WARNING][5137] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0", GenerateName:"calico-apiserver-74bc7c86ff-", Namespace:"calico-apiserver", SelfLink:"", UID:"30df0e77-1e34-4685-80e6-9457028d7acb", ResourceVersion:"1055", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74bc7c86ff", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e", Pod:"calico-apiserver-74bc7c86ff-lcldf", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic12dbb93b27", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:17.728840 env[1439]: 2025-05-17 00:38:17.643 [INFO][5137] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" May 17 00:38:17.728840 env[1439]: 2025-05-17 00:38:17.643 [INFO][5137] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" iface="eth0" netns="" May 17 00:38:17.728840 env[1439]: 2025-05-17 00:38:17.643 [INFO][5137] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" May 17 00:38:17.728840 env[1439]: 2025-05-17 00:38:17.643 [INFO][5137] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" May 17 00:38:17.728840 env[1439]: 2025-05-17 00:38:17.699 [INFO][5144] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" HandleID="k8s-pod-network.3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:38:17.728840 env[1439]: 2025-05-17 00:38:17.700 [INFO][5144] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:17.728840 env[1439]: 2025-05-17 00:38:17.701 [INFO][5144] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:17.728840 env[1439]: 2025-05-17 00:38:17.721 [WARNING][5144] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" HandleID="k8s-pod-network.3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:38:17.728840 env[1439]: 2025-05-17 00:38:17.721 [INFO][5144] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" HandleID="k8s-pod-network.3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:38:17.728840 env[1439]: 2025-05-17 00:38:17.723 [INFO][5144] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:17.728840 env[1439]: 2025-05-17 00:38:17.726 [INFO][5137] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" May 17 00:38:17.729706 env[1439]: time="2025-05-17T00:38:17.729665949Z" level=info msg="TearDown network for sandbox \"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\" successfully" May 17 00:38:17.729799 env[1439]: time="2025-05-17T00:38:17.729780649Z" level=info msg="StopPodSandbox for \"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\" returns successfully" May 17 00:38:17.732782 env[1439]: time="2025-05-17T00:38:17.732751240Z" level=info msg="RemovePodSandbox for \"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\"" May 17 00:38:17.732969 env[1439]: time="2025-05-17T00:38:17.732925240Z" level=info msg="Forcibly stopping sandbox \"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\"" May 17 00:38:17.917182 env[1439]: 2025-05-17 00:38:17.826 [WARNING][5159] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0", GenerateName:"calico-apiserver-74bc7c86ff-", Namespace:"calico-apiserver", SelfLink:"", UID:"30df0e77-1e34-4685-80e6-9457028d7acb", ResourceVersion:"1055", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74bc7c86ff", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e", Pod:"calico-apiserver-74bc7c86ff-lcldf", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic12dbb93b27", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:17.917182 env[1439]: 2025-05-17 00:38:17.827 [INFO][5159] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" May 17 00:38:17.917182 env[1439]: 2025-05-17 00:38:17.827 [INFO][5159] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" iface="eth0" netns="" May 17 00:38:17.917182 env[1439]: 2025-05-17 00:38:17.827 [INFO][5159] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" May 17 00:38:17.917182 env[1439]: 2025-05-17 00:38:17.827 [INFO][5159] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" May 17 00:38:17.917182 env[1439]: 2025-05-17 00:38:17.899 [INFO][5166] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" HandleID="k8s-pod-network.3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:38:17.917182 env[1439]: 2025-05-17 00:38:17.900 [INFO][5166] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:17.917182 env[1439]: 2025-05-17 00:38:17.900 [INFO][5166] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:17.917182 env[1439]: 2025-05-17 00:38:17.909 [WARNING][5166] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" HandleID="k8s-pod-network.3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:38:17.917182 env[1439]: 2025-05-17 00:38:17.909 [INFO][5166] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" HandleID="k8s-pod-network.3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:38:17.917182 env[1439]: 2025-05-17 00:38:17.914 [INFO][5166] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:17.917182 env[1439]: 2025-05-17 00:38:17.915 [INFO][5159] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d" May 17 00:38:17.917936 env[1439]: time="2025-05-17T00:38:17.917227812Z" level=info msg="TearDown network for sandbox \"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\" successfully" May 17 00:38:17.926185 env[1439]: time="2025-05-17T00:38:17.926139987Z" level=info msg="RemovePodSandbox \"3a02919750c83ed05af19ad59863befcf565c5c0c6903858cbfcd6e0ae44a92d\" returns successfully" May 17 00:38:17.926904 env[1439]: time="2025-05-17T00:38:17.926833885Z" level=info msg="StopPodSandbox for \"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\"" May 17 00:38:18.116000 audit[4930]: AVC avc: denied { watch } for pid=4930 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_37_50.638250015/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c643 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c264,c643 tclass=file permissive=0 May 17 00:38:18.116000 audit[4930]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002a9e920 a2=fc6 a3=0 items=0 ppid=4422 pid=4930 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c643 key=(null) May 17 00:38:18.116000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:38:18.127135 env[1439]: 2025-05-17 00:38:18.065 [WARNING][5183] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0", GenerateName:"calico-apiserver-74bc7c86ff-", Namespace:"calico-apiserver", SelfLink:"", UID:"f7311dad-530c-4ead-87b1-cc9be9e8f9e6", ResourceVersion:"1064", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74bc7c86ff", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f", Pod:"calico-apiserver-74bc7c86ff-rst5w", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic5c2536fc78", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:18.127135 env[1439]: 2025-05-17 00:38:18.066 [INFO][5183] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" May 17 00:38:18.127135 env[1439]: 2025-05-17 00:38:18.066 [INFO][5183] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" iface="eth0" netns="" May 17 00:38:18.127135 env[1439]: 2025-05-17 00:38:18.066 [INFO][5183] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" May 17 00:38:18.127135 env[1439]: 2025-05-17 00:38:18.066 [INFO][5183] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" May 17 00:38:18.127135 env[1439]: 2025-05-17 00:38:18.112 [INFO][5190] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" HandleID="k8s-pod-network.6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:38:18.127135 env[1439]: 2025-05-17 00:38:18.112 [INFO][5190] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:18.127135 env[1439]: 2025-05-17 00:38:18.112 [INFO][5190] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:18.127135 env[1439]: 2025-05-17 00:38:18.122 [WARNING][5190] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" HandleID="k8s-pod-network.6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:38:18.127135 env[1439]: 2025-05-17 00:38:18.122 [INFO][5190] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" HandleID="k8s-pod-network.6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:38:18.127135 env[1439]: 2025-05-17 00:38:18.124 [INFO][5190] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:18.127135 env[1439]: 2025-05-17 00:38:18.125 [INFO][5183] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" May 17 00:38:18.128221 env[1439]: time="2025-05-17T00:38:18.128171215Z" level=info msg="TearDown network for sandbox \"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\" successfully" May 17 00:38:18.128307 env[1439]: time="2025-05-17T00:38:18.128290614Z" level=info msg="StopPodSandbox for \"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\" returns successfully" May 17 00:38:18.128897 env[1439]: time="2025-05-17T00:38:18.128868513Z" level=info msg="RemovePodSandbox for \"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\"" May 17 00:38:18.129081 env[1439]: time="2025-05-17T00:38:18.129032712Z" level=info msg="Forcibly stopping sandbox \"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\"" May 17 00:38:18.321646 env[1439]: 2025-05-17 00:38:18.236 [WARNING][5206] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0", GenerateName:"calico-apiserver-74bc7c86ff-", Namespace:"calico-apiserver", SelfLink:"", UID:"f7311dad-530c-4ead-87b1-cc9be9e8f9e6", ResourceVersion:"1064", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74bc7c86ff", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f", Pod:"calico-apiserver-74bc7c86ff-rst5w", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic5c2536fc78", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:18.321646 env[1439]: 2025-05-17 00:38:18.236 [INFO][5206] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" May 17 00:38:18.321646 env[1439]: 2025-05-17 00:38:18.236 [INFO][5206] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" iface="eth0" netns="" May 17 00:38:18.321646 env[1439]: 2025-05-17 00:38:18.236 [INFO][5206] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" May 17 00:38:18.321646 env[1439]: 2025-05-17 00:38:18.236 [INFO][5206] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" May 17 00:38:18.321646 env[1439]: 2025-05-17 00:38:18.300 [INFO][5213] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" HandleID="k8s-pod-network.6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:38:18.321646 env[1439]: 2025-05-17 00:38:18.300 [INFO][5213] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:18.321646 env[1439]: 2025-05-17 00:38:18.300 [INFO][5213] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:18.321646 env[1439]: 2025-05-17 00:38:18.310 [WARNING][5213] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" HandleID="k8s-pod-network.6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:38:18.321646 env[1439]: 2025-05-17 00:38:18.310 [INFO][5213] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" HandleID="k8s-pod-network.6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:38:18.321646 env[1439]: 2025-05-17 00:38:18.313 [INFO][5213] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:18.321646 env[1439]: 2025-05-17 00:38:18.315 [INFO][5206] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555" May 17 00:38:18.322445 env[1439]: time="2025-05-17T00:38:18.322401068Z" level=info msg="TearDown network for sandbox \"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\" successfully" May 17 00:38:18.931399 kubelet[2441]: I0517 00:38:18.931362 2441 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:38:19.044326 kubelet[2441]: I0517 00:38:19.044291 2441 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:38:19.045887 env[1439]: time="2025-05-17T00:38:19.045691335Z" level=info msg="StopContainer for \"567178a15c67aba3af1d3c3a52fcdee15e13ed155e0d9909df714c616eaa0223\" with timeout 30 (s)" May 17 00:38:19.046141 env[1439]: time="2025-05-17T00:38:19.046102134Z" level=info msg="Stop container \"567178a15c67aba3af1d3c3a52fcdee15e13ed155e0d9909df714c616eaa0223\" with signal terminated" May 17 00:38:19.186762 systemd[1]: Created slice kubepods-besteffort-pod48aa7aa9_2114_474d_ba3f_5b1471bfb687.slice. May 17 00:38:19.191365 kubelet[2441]: I0517 00:38:19.191314 2441 status_manager.go:890] "Failed to get status for pod" podUID="48aa7aa9-2114-474d-ba3f-5b1471bfb687" pod="calico-apiserver/calico-apiserver-74d588d884-g64fh" err="pods \"calico-apiserver-74d588d884-g64fh\" is forbidden: User \"system:node:ci-3510.3.7-n-191fd4fe6d\" cannot get resource \"pods\" in API group \"\" in the namespace \"calico-apiserver\": no relationship found between node 'ci-3510.3.7-n-191fd4fe6d' and this object" May 17 00:38:19.281910 systemd[1]: cri-containerd-567178a15c67aba3af1d3c3a52fcdee15e13ed155e0d9909df714c616eaa0223.scope: Deactivated successfully. May 17 00:38:19.280000 audit: BPF prog-id=206 op=UNLOAD May 17 00:38:19.282239 systemd[1]: cri-containerd-567178a15c67aba3af1d3c3a52fcdee15e13ed155e0d9909df714c616eaa0223.scope: Consumed 1.414s CPU time. May 17 00:38:19.287000 audit: BPF prog-id=209 op=UNLOAD May 17 00:38:19.307000 audit[5232]: NETFILTER_CFG table=filter:134 family=2 entries=13 op=nft_register_rule pid=5232 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:19.307000 audit[5232]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe7e2a92c0 a2=0 a3=7ffe7e2a92ac items=0 ppid=2549 pid=5232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:19.307000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:19.316155 env[1439]: time="2025-05-17T00:38:19.316098586Z" level=info msg="shim disconnected" id=567178a15c67aba3af1d3c3a52fcdee15e13ed155e0d9909df714c616eaa0223 May 17 00:38:19.316555 env[1439]: time="2025-05-17T00:38:19.316161486Z" level=warning msg="cleaning up after shim disconnected" id=567178a15c67aba3af1d3c3a52fcdee15e13ed155e0d9909df714c616eaa0223 namespace=k8s.io May 17 00:38:19.316555 env[1439]: time="2025-05-17T00:38:19.316174186Z" level=info msg="cleaning up dead shim" May 17 00:38:19.317000 audit[5232]: NETFILTER_CFG table=nat:135 family=2 entries=27 op=nft_register_chain pid=5232 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:19.317000 audit[5232]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe7e2a92c0 a2=0 a3=7ffe7e2a92ac items=0 ppid=2549 pid=5232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:19.317000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:19.319527 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-567178a15c67aba3af1d3c3a52fcdee15e13ed155e0d9909df714c616eaa0223-rootfs.mount: Deactivated successfully. May 17 00:38:19.322428 kubelet[2441]: I0517 00:38:19.322192 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z27k7\" (UniqueName: \"kubernetes.io/projected/48aa7aa9-2114-474d-ba3f-5b1471bfb687-kube-api-access-z27k7\") pod \"calico-apiserver-74d588d884-g64fh\" (UID: \"48aa7aa9-2114-474d-ba3f-5b1471bfb687\") " pod="calico-apiserver/calico-apiserver-74d588d884-g64fh" May 17 00:38:19.322428 kubelet[2441]: I0517 00:38:19.322295 2441 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/48aa7aa9-2114-474d-ba3f-5b1471bfb687-calico-apiserver-certs\") pod \"calico-apiserver-74d588d884-g64fh\" (UID: \"48aa7aa9-2114-474d-ba3f-5b1471bfb687\") " pod="calico-apiserver/calico-apiserver-74d588d884-g64fh" May 17 00:38:19.328835 env[1439]: time="2025-05-17T00:38:19.328762751Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:38:19Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5239 runtime=io.containerd.runc.v2\n" May 17 00:38:19.342000 audit[5252]: NETFILTER_CFG table=filter:136 family=2 entries=12 op=nft_register_rule pid=5252 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:19.342000 audit[5252]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff7e5e3140 a2=0 a3=7fff7e5e312c items=0 ppid=2549 pid=5252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:19.342000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:19.347000 audit[5252]: NETFILTER_CFG table=nat:137 family=2 entries=30 op=nft_register_rule pid=5252 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:19.347000 audit[5252]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff7e5e3140 a2=0 a3=7fff7e5e312c items=0 ppid=2549 pid=5252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:19.347000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:19.614864 env[1439]: time="2025-05-17T00:38:19.523062713Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74d588d884-g64fh,Uid:48aa7aa9-2114-474d-ba3f-5b1471bfb687,Namespace:calico-apiserver,Attempt:0,}" May 17 00:38:20.089380 kernel: kauditd_printk_skb: 116 callbacks suppressed May 17 00:38:20.089525 kernel: audit: type=1400 audit(1747442300.083:1419): avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:20.083000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:20.083000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007e1c00 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:38:20.125364 kernel: audit: type=1300 audit(1747442300.083:1419): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007e1c00 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:38:20.125471 kernel: audit: type=1327 audit(1747442300.083:1419): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:20.083000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:20.083000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:20.182218 kernel: audit: type=1400 audit(1747442300.083:1420): avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:20.182387 kernel: audit: type=1300 audit(1747442300.083:1420): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f6aa60 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:38:20.083000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f6aa60 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:38:20.083000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:20.200401 kernel: audit: type=1327 audit(1747442300.083:1420): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:20.083000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:20.224464 kernel: audit: type=1400 audit(1747442300.083:1421): avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:20.083000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000afe060 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:38:20.083000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:20.264303 kernel: audit: type=1300 audit(1747442300.083:1421): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000afe060 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:38:20.264475 kernel: audit: type=1327 audit(1747442300.083:1421): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:20.083000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:20.283362 kernel: audit: type=1400 audit(1747442300.083:1422): avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:20.083000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f6b6e0 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:38:20.083000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:23.178581 env[1439]: time="2025-05-17T00:38:23.178517983Z" level=info msg="RemovePodSandbox \"6e18246c74adfa53036a1d7fec6fc3bda7bc4c37269ab785503c1819f22fe555\" returns successfully" May 17 00:38:23.180152 env[1439]: time="2025-05-17T00:38:23.179729880Z" level=info msg="StopPodSandbox for \"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\"" May 17 00:38:23.190276 env[1439]: time="2025-05-17T00:38:23.190240953Z" level=info msg="StopContainer for \"567178a15c67aba3af1d3c3a52fcdee15e13ed155e0d9909df714c616eaa0223\" returns successfully" May 17 00:38:23.191667 env[1439]: time="2025-05-17T00:38:23.190618452Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:23.193011 env[1439]: time="2025-05-17T00:38:23.192290447Z" level=info msg="StopPodSandbox for \"70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e\"" May 17 00:38:23.193548 env[1439]: time="2025-05-17T00:38:23.193519344Z" level=info msg="Container to stop \"567178a15c67aba3af1d3c3a52fcdee15e13ed155e0d9909df714c616eaa0223\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 17 00:38:23.199984 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e-shm.mount: Deactivated successfully. May 17 00:38:23.207257 env[1439]: time="2025-05-17T00:38:23.207213509Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:23.215447 env[1439]: time="2025-05-17T00:38:23.215411087Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:23.225000 audit: BPF prog-id=174 op=UNLOAD May 17 00:38:23.226157 systemd[1]: cri-containerd-70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e.scope: Deactivated successfully. May 17 00:38:23.230821 env[1439]: time="2025-05-17T00:38:23.230790547Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:23.229000 audit: BPF prog-id=177 op=UNLOAD May 17 00:38:23.231583 env[1439]: time="2025-05-17T00:38:23.231547845Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:38:23.234311 env[1439]: time="2025-05-17T00:38:23.234281938Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:38:23.247657 env[1439]: time="2025-05-17T00:38:23.245558709Z" level=info msg="CreateContainer within sandbox \"b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:38:23.316077 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1620369454.mount: Deactivated successfully. May 17 00:38:23.332627 env[1439]: time="2025-05-17T00:38:23.332571983Z" level=info msg="CreateContainer within sandbox \"b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"c5dface0a8ea064c453c53acf23b4c6e7ba9e27f4cd16bd43e987d2395fe783e\"" May 17 00:38:23.333499 env[1439]: time="2025-05-17T00:38:23.333459980Z" level=info msg="StartContainer for \"c5dface0a8ea064c453c53acf23b4c6e7ba9e27f4cd16bd43e987d2395fe783e\"" May 17 00:38:23.370799 env[1439]: time="2025-05-17T00:38:23.369759486Z" level=info msg="shim disconnected" id=70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e May 17 00:38:23.370799 env[1439]: time="2025-05-17T00:38:23.369816486Z" level=warning msg="cleaning up after shim disconnected" id=70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e namespace=k8s.io May 17 00:38:23.370799 env[1439]: time="2025-05-17T00:38:23.369828486Z" level=info msg="cleaning up dead shim" May 17 00:38:23.406930 systemd[1]: Started cri-containerd-c5dface0a8ea064c453c53acf23b4c6e7ba9e27f4cd16bd43e987d2395fe783e.scope. May 17 00:38:23.413786 env[1439]: time="2025-05-17T00:38:23.413733372Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:38:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5317 runtime=io.containerd.runc.v2\n" May 17 00:38:23.470433 env[1439]: time="2025-05-17T00:38:23.438718207Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:38:23.471821 env[1439]: time="2025-05-17T00:38:23.471722721Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:38:23.472970 kubelet[2441]: E0517 00:38:23.472051 2441 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:38:23.472970 kubelet[2441]: E0517 00:38:23.472117 2441 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:38:23.472970 kubelet[2441]: E0517 00:38:23.472244 2441 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fzjs4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-b8dc5df5c-7xlwx_calico-system(1be837ab-f6c8-4d7d-9976-b853d9b4b123): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:38:23.473823 kubelet[2441]: E0517 00:38:23.473768 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-b8dc5df5c-7xlwx" podUID="1be837ab-f6c8-4d7d-9976-b853d9b4b123" May 17 00:38:23.520942 env[1439]: 2025-05-17 00:38:23.344 [WARNING][5269] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"1bd08ff5-79c3-4229-a51c-edcb14417442", ResourceVersion:"1042", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0", Pod:"coredns-668d6bf9bc-jjw7b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali004dc5c2c2d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:23.520942 env[1439]: 2025-05-17 00:38:23.344 [INFO][5269] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" May 17 00:38:23.520942 env[1439]: 2025-05-17 00:38:23.344 [INFO][5269] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" iface="eth0" netns="" May 17 00:38:23.520942 env[1439]: 2025-05-17 00:38:23.344 [INFO][5269] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" May 17 00:38:23.520942 env[1439]: 2025-05-17 00:38:23.344 [INFO][5269] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" May 17 00:38:23.520942 env[1439]: 2025-05-17 00:38:23.483 [INFO][5312] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" HandleID="k8s-pod-network.10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0" May 17 00:38:23.520942 env[1439]: 2025-05-17 00:38:23.483 [INFO][5312] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:23.520942 env[1439]: 2025-05-17 00:38:23.484 [INFO][5312] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:23.520942 env[1439]: 2025-05-17 00:38:23.513 [WARNING][5312] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" HandleID="k8s-pod-network.10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0" May 17 00:38:23.520942 env[1439]: 2025-05-17 00:38:23.513 [INFO][5312] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" HandleID="k8s-pod-network.10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0" May 17 00:38:23.520942 env[1439]: 2025-05-17 00:38:23.518 [INFO][5312] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:23.520942 env[1439]: 2025-05-17 00:38:23.519 [INFO][5269] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" May 17 00:38:23.521683 env[1439]: time="2025-05-17T00:38:23.520975693Z" level=info msg="TearDown network for sandbox \"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\" successfully" May 17 00:38:23.521683 env[1439]: time="2025-05-17T00:38:23.521013393Z" level=info msg="StopPodSandbox for \"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\" returns successfully" May 17 00:38:23.523841 env[1439]: time="2025-05-17T00:38:23.523795086Z" level=info msg="RemovePodSandbox for \"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\"" May 17 00:38:23.523961 env[1439]: time="2025-05-17T00:38:23.523841486Z" level=info msg="Forcibly stopping sandbox \"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\"" May 17 00:38:23.682258 systemd-networkd[1588]: calic12dbb93b27: Link DOWN May 17 00:38:23.682272 systemd-networkd[1588]: calic12dbb93b27: Lost carrier May 17 00:38:23.777565 systemd-networkd[1588]: calic5a4e6f1a65: Link UP May 17 00:38:23.801000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.801000 audit[5313]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f5a861e1a18 items=0 ppid=4693 pid=5313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:23.808440 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic5a4e6f1a65: link becomes ready May 17 00:38:23.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335646661636530613865613036346334353363353361636632336234 May 17 00:38:23.801000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.801000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.801000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.801000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.801000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.801000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.801000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.801000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.801000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.801000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.801000 audit: BPF prog-id=225 op=LOAD May 17 00:38:23.801000 audit[5313]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000178fe8 items=0 ppid=4693 pid=5313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:23.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335646661636530613865613036346334353363353361636632336234 May 17 00:38:23.807000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.807000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.807000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.807000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.807000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.807000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.807000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.807000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.807000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.807000 audit: BPF prog-id=226 op=LOAD May 17 00:38:23.807000 audit[5313]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000179038 items=0 ppid=4693 pid=5313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:23.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335646661636530613865613036346334353363353361636632336234 May 17 00:38:23.807000 audit: BPF prog-id=226 op=UNLOAD May 17 00:38:23.807000 audit: BPF prog-id=225 op=UNLOAD May 17 00:38:23.807000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.807000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.807000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.807000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.807000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.807000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.807000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.807000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.807000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.807000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:23.807000 audit: BPF prog-id=227 op=LOAD May 17 00:38:23.807000 audit[5313]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001790c8 items=0 ppid=4693 pid=5313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:23.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335646661636530613865613036346334353363353361636632336234 May 17 00:38:23.811269 systemd-networkd[1588]: calic5a4e6f1a65: Gained carrier May 17 00:38:23.836445 env[1439]: 2025-05-17 00:38:23.437 [INFO][5283] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--g64fh-eth0 calico-apiserver-74d588d884- calico-apiserver 48aa7aa9-2114-474d-ba3f-5b1471bfb687 1154 0 2025-05-17 00:38:19 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:74d588d884 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-191fd4fe6d calico-apiserver-74d588d884-g64fh eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic5a4e6f1a65 [] [] }} ContainerID="724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2" Namespace="calico-apiserver" Pod="calico-apiserver-74d588d884-g64fh" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--g64fh-" May 17 00:38:23.836445 env[1439]: 2025-05-17 00:38:23.467 [INFO][5283] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2" Namespace="calico-apiserver" Pod="calico-apiserver-74d588d884-g64fh" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--g64fh-eth0" May 17 00:38:23.836445 env[1439]: 2025-05-17 00:38:23.634 [INFO][5368] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2" HandleID="k8s-pod-network.724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--g64fh-eth0" May 17 00:38:23.836445 env[1439]: 2025-05-17 00:38:23.634 [INFO][5368] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2" HandleID="k8s-pod-network.724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--g64fh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000304110), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-191fd4fe6d", "pod":"calico-apiserver-74d588d884-g64fh", "timestamp":"2025-05-17 00:38:23.634193699 +0000 UTC"}, Hostname:"ci-3510.3.7-n-191fd4fe6d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:38:23.836445 env[1439]: 2025-05-17 00:38:23.634 [INFO][5368] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:23.836445 env[1439]: 2025-05-17 00:38:23.634 [INFO][5368] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:23.836445 env[1439]: 2025-05-17 00:38:23.634 [INFO][5368] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-191fd4fe6d' May 17 00:38:23.836445 env[1439]: 2025-05-17 00:38:23.692 [INFO][5368] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:23.836445 env[1439]: 2025-05-17 00:38:23.705 [INFO][5368] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:23.836445 env[1439]: 2025-05-17 00:38:23.712 [INFO][5368] ipam/ipam.go 511: Trying affinity for 192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:23.836445 env[1439]: 2025-05-17 00:38:23.714 [INFO][5368] ipam/ipam.go 158: Attempting to load block cidr=192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:23.836445 env[1439]: 2025-05-17 00:38:23.719 [INFO][5368] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.85.192/26 host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:23.836445 env[1439]: 2025-05-17 00:38:23.719 [INFO][5368] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.85.192/26 handle="k8s-pod-network.724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:23.836445 env[1439]: 2025-05-17 00:38:23.721 [INFO][5368] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2 May 17 00:38:23.836445 env[1439]: 2025-05-17 00:38:23.727 [INFO][5368] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.85.192/26 handle="k8s-pod-network.724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:23.836445 env[1439]: 2025-05-17 00:38:23.769 [INFO][5368] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.85.202/26] block=192.168.85.192/26 handle="k8s-pod-network.724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:23.836445 env[1439]: 2025-05-17 00:38:23.769 [INFO][5368] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.85.202/26] handle="k8s-pod-network.724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2" host="ci-3510.3.7-n-191fd4fe6d" May 17 00:38:23.836445 env[1439]: 2025-05-17 00:38:23.769 [INFO][5368] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:23.836445 env[1439]: 2025-05-17 00:38:23.769 [INFO][5368] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.85.202/26] IPv6=[] ContainerID="724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2" HandleID="k8s-pod-network.724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--g64fh-eth0" May 17 00:38:23.837423 env[1439]: 2025-05-17 00:38:23.771 [INFO][5283] cni-plugin/k8s.go 418: Populated endpoint ContainerID="724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2" Namespace="calico-apiserver" Pod="calico-apiserver-74d588d884-g64fh" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--g64fh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--g64fh-eth0", GenerateName:"calico-apiserver-74d588d884-", Namespace:"calico-apiserver", SelfLink:"", UID:"48aa7aa9-2114-474d-ba3f-5b1471bfb687", ResourceVersion:"1154", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 38, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74d588d884", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"", Pod:"calico-apiserver-74d588d884-g64fh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.202/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic5a4e6f1a65", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:23.837423 env[1439]: 2025-05-17 00:38:23.773 [INFO][5283] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.85.202/32] ContainerID="724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2" Namespace="calico-apiserver" Pod="calico-apiserver-74d588d884-g64fh" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--g64fh-eth0" May 17 00:38:23.837423 env[1439]: 2025-05-17 00:38:23.773 [INFO][5283] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic5a4e6f1a65 ContainerID="724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2" Namespace="calico-apiserver" Pod="calico-apiserver-74d588d884-g64fh" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--g64fh-eth0" May 17 00:38:23.837423 env[1439]: 2025-05-17 00:38:23.813 [INFO][5283] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2" Namespace="calico-apiserver" Pod="calico-apiserver-74d588d884-g64fh" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--g64fh-eth0" May 17 00:38:23.837423 env[1439]: 2025-05-17 00:38:23.820 [INFO][5283] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2" Namespace="calico-apiserver" Pod="calico-apiserver-74d588d884-g64fh" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--g64fh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--g64fh-eth0", GenerateName:"calico-apiserver-74d588d884-", Namespace:"calico-apiserver", SelfLink:"", UID:"48aa7aa9-2114-474d-ba3f-5b1471bfb687", ResourceVersion:"1154", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 38, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74d588d884", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2", Pod:"calico-apiserver-74d588d884-g64fh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.202/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic5a4e6f1a65", MAC:"72:3e:8c:fb:20:2c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:23.837423 env[1439]: 2025-05-17 00:38:23.834 [INFO][5283] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2" Namespace="calico-apiserver" Pod="calico-apiserver-74d588d884-g64fh" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--g64fh-eth0" May 17 00:38:23.847372 env[1439]: 2025-05-17 00:38:23.705 [WARNING][5381] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"1bd08ff5-79c3-4229-a51c-edcb14417442", ResourceVersion:"1042", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"3d28f3e7f9a228ae00d7025929c8ac854efc388b9c75bcdfdb7795a9fadfdcf0", Pod:"coredns-668d6bf9bc-jjw7b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali004dc5c2c2d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:23.847372 env[1439]: 2025-05-17 00:38:23.705 [INFO][5381] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" May 17 00:38:23.847372 env[1439]: 2025-05-17 00:38:23.705 [INFO][5381] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" iface="eth0" netns="" May 17 00:38:23.847372 env[1439]: 2025-05-17 00:38:23.705 [INFO][5381] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" May 17 00:38:23.847372 env[1439]: 2025-05-17 00:38:23.705 [INFO][5381] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" May 17 00:38:23.847372 env[1439]: 2025-05-17 00:38:23.817 [INFO][5394] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" HandleID="k8s-pod-network.10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0" May 17 00:38:23.847372 env[1439]: 2025-05-17 00:38:23.818 [INFO][5394] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:23.847372 env[1439]: 2025-05-17 00:38:23.818 [INFO][5394] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:23.847372 env[1439]: 2025-05-17 00:38:23.834 [WARNING][5394] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" HandleID="k8s-pod-network.10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0" May 17 00:38:23.847372 env[1439]: 2025-05-17 00:38:23.834 [INFO][5394] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" HandleID="k8s-pod-network.10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--jjw7b-eth0" May 17 00:38:23.847372 env[1439]: 2025-05-17 00:38:23.840 [INFO][5394] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:23.847372 env[1439]: 2025-05-17 00:38:23.845 [INFO][5381] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb" May 17 00:38:23.847372 env[1439]: time="2025-05-17T00:38:23.846577347Z" level=info msg="TearDown network for sandbox \"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\" successfully" May 17 00:38:23.865368 env[1439]: time="2025-05-17T00:38:23.862994604Z" level=info msg="RemovePodSandbox \"10a396a33d12df74f60d1f7608c26a9145bf81ed36acc9ccf1f535fe60f691fb\" returns successfully" May 17 00:38:23.865368 env[1439]: time="2025-05-17T00:38:23.864554600Z" level=info msg="StopPodSandbox for \"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\"" May 17 00:38:23.889374 env[1439]: time="2025-05-17T00:38:23.887431840Z" level=info msg="StartContainer for \"c5dface0a8ea064c453c53acf23b4c6e7ba9e27f4cd16bd43e987d2395fe783e\" returns successfully" May 17 00:38:23.902253 env[1439]: time="2025-05-17T00:38:23.902052702Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:38:23.902253 env[1439]: time="2025-05-17T00:38:23.902096802Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:38:23.902253 env[1439]: time="2025-05-17T00:38:23.902113302Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:38:23.902685 env[1439]: time="2025-05-17T00:38:23.902606401Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2 pid=5435 runtime=io.containerd.runc.v2 May 17 00:38:23.945474 env[1439]: 2025-05-17 00:38:23.679 [INFO][5362] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" May 17 00:38:23.945474 env[1439]: 2025-05-17 00:38:23.680 [INFO][5362] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" iface="eth0" netns="/var/run/netns/cni-5bca38d6-5e07-7e4a-5b4f-458e1d6d175d" May 17 00:38:23.945474 env[1439]: 2025-05-17 00:38:23.680 [INFO][5362] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" iface="eth0" netns="/var/run/netns/cni-5bca38d6-5e07-7e4a-5b4f-458e1d6d175d" May 17 00:38:23.945474 env[1439]: 2025-05-17 00:38:23.701 [INFO][5362] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" after=21.063046ms iface="eth0" netns="/var/run/netns/cni-5bca38d6-5e07-7e4a-5b4f-458e1d6d175d" May 17 00:38:23.945474 env[1439]: 2025-05-17 00:38:23.701 [INFO][5362] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" May 17 00:38:23.945474 env[1439]: 2025-05-17 00:38:23.701 [INFO][5362] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" May 17 00:38:23.945474 env[1439]: 2025-05-17 00:38:23.826 [INFO][5392] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" HandleID="k8s-pod-network.70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:38:23.945474 env[1439]: 2025-05-17 00:38:23.828 [INFO][5392] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:23.945474 env[1439]: 2025-05-17 00:38:23.840 [INFO][5392] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:23.945474 env[1439]: 2025-05-17 00:38:23.926 [INFO][5392] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" HandleID="k8s-pod-network.70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:38:23.945474 env[1439]: 2025-05-17 00:38:23.926 [INFO][5392] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" HandleID="k8s-pod-network.70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:38:23.945474 env[1439]: 2025-05-17 00:38:23.934 [INFO][5392] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:23.945474 env[1439]: 2025-05-17 00:38:23.941 [INFO][5362] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" May 17 00:38:23.947537 env[1439]: time="2025-05-17T00:38:23.947487484Z" level=info msg="TearDown network for sandbox \"70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e\" successfully" May 17 00:38:23.947696 env[1439]: time="2025-05-17T00:38:23.947670384Z" level=info msg="StopPodSandbox for \"70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e\" returns successfully" May 17 00:38:23.962932 systemd[1]: Started cri-containerd-724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2.scope. May 17 00:38:24.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.002000 audit: BPF prog-id=228 op=LOAD May 17 00:38:24.002000 audit[5457]: AVC avc: denied { bpf } for pid=5457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.002000 audit[5457]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=5435 pid=5457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:24.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732346131346230383037363737336439316265626163363930613266 May 17 00:38:24.002000 audit[5457]: AVC avc: denied { perfmon } for pid=5457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.002000 audit[5457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=5435 pid=5457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:24.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732346131346230383037363737336439316265626163363930613266 May 17 00:38:24.002000 audit[5457]: AVC avc: denied { bpf } for pid=5457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.002000 audit[5457]: AVC avc: denied { bpf } for pid=5457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.002000 audit[5457]: AVC avc: denied { bpf } for pid=5457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.002000 audit[5457]: AVC avc: denied { perfmon } for pid=5457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.002000 audit[5457]: AVC avc: denied { perfmon } for pid=5457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.002000 audit[5457]: AVC avc: denied { perfmon } for pid=5457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.002000 audit[5457]: AVC avc: denied { perfmon } for pid=5457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.002000 audit[5457]: AVC avc: denied { perfmon } for pid=5457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.002000 audit[5457]: AVC avc: denied { bpf } for pid=5457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.002000 audit[5457]: AVC avc: denied { bpf } for pid=5457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.002000 audit: BPF prog-id=229 op=LOAD May 17 00:38:24.002000 audit[5457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000347cd0 items=0 ppid=5435 pid=5457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:24.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732346131346230383037363737336439316265626163363930613266 May 17 00:38:24.003000 audit[5457]: AVC avc: denied { bpf } for pid=5457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.003000 audit[5457]: AVC avc: denied { bpf } for pid=5457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.003000 audit[5457]: AVC avc: denied { perfmon } for pid=5457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.003000 audit[5457]: AVC avc: denied { perfmon } for pid=5457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.003000 audit[5457]: AVC avc: denied { perfmon } for pid=5457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.003000 audit[5457]: AVC avc: denied { perfmon } for pid=5457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.003000 audit[5457]: AVC avc: denied { perfmon } for pid=5457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.003000 audit[5457]: AVC avc: denied { bpf } for pid=5457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.003000 audit[5457]: AVC avc: denied { bpf } for pid=5457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.003000 audit: BPF prog-id=230 op=LOAD May 17 00:38:24.003000 audit[5457]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000347d18 items=0 ppid=5435 pid=5457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:24.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732346131346230383037363737336439316265626163363930613266 May 17 00:38:24.003000 audit: BPF prog-id=230 op=UNLOAD May 17 00:38:24.003000 audit: BPF prog-id=229 op=UNLOAD May 17 00:38:24.003000 audit[5457]: AVC avc: denied { bpf } for pid=5457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.003000 audit[5457]: AVC avc: denied { bpf } for pid=5457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.003000 audit[5457]: AVC avc: denied { bpf } for pid=5457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.003000 audit[5457]: AVC avc: denied { perfmon } for pid=5457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.003000 audit[5457]: AVC avc: denied { perfmon } for pid=5457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.003000 audit[5457]: AVC avc: denied { perfmon } for pid=5457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.003000 audit[5457]: AVC avc: denied { perfmon } for pid=5457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.003000 audit[5457]: AVC avc: denied { perfmon } for pid=5457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.003000 audit[5457]: AVC avc: denied { bpf } for pid=5457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.003000 audit[5457]: AVC avc: denied { bpf } for pid=5457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.003000 audit: BPF prog-id=231 op=LOAD May 17 00:38:24.003000 audit[5457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003cc128 items=0 ppid=5435 pid=5457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:24.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732346131346230383037363737336439316265626163363930613266 May 17 00:38:24.022000 audit[5477]: NETFILTER_CFG table=filter:138 family=2 entries=63 op=nft_register_rule pid=5477 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:24.022000 audit[5477]: SYSCALL arch=c000003e syscall=46 success=yes exit=10252 a0=3 a1=7ffe479666a0 a2=0 a3=7ffe4796668c items=0 ppid=3759 pid=5477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:24.022000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:24.032000 audit[5477]: NETFILTER_CFG table=filter:139 family=2 entries=4 op=nft_unregister_chain pid=5477 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:24.032000 audit[5477]: SYSCALL arch=c000003e syscall=46 success=yes exit=560 a0=3 a1=7ffe479666a0 a2=0 a3=55c07b96d000 items=0 ppid=3759 pid=5477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:24.032000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:24.063000 audit[5488]: NETFILTER_CFG table=filter:140 family=2 entries=12 op=nft_register_rule pid=5488 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:24.063000 audit[5488]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc7efa1660 a2=0 a3=7ffc7efa164c items=0 ppid=2549 pid=5488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:24.063000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:24.067000 audit[5488]: NETFILTER_CFG table=nat:141 family=2 entries=30 op=nft_register_rule pid=5488 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:24.067000 audit[5488]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc7efa1660 a2=0 a3=7ffc7efa164c items=0 ppid=2549 pid=5488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:24.067000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:24.073442 kubelet[2441]: I0517 00:38:24.071020 2441 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/30df0e77-1e34-4685-80e6-9457028d7acb-calico-apiserver-certs\") pod \"30df0e77-1e34-4685-80e6-9457028d7acb\" (UID: \"30df0e77-1e34-4685-80e6-9457028d7acb\") " May 17 00:38:24.073442 kubelet[2441]: I0517 00:38:24.071087 2441 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-lbxl6\" (UniqueName: \"kubernetes.io/projected/30df0e77-1e34-4685-80e6-9457028d7acb-kube-api-access-lbxl6\") pod \"30df0e77-1e34-4685-80e6-9457028d7acb\" (UID: \"30df0e77-1e34-4685-80e6-9457028d7acb\") " May 17 00:38:24.078987 kubelet[2441]: I0517 00:38:24.078948 2441 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/30df0e77-1e34-4685-80e6-9457028d7acb-kube-api-access-lbxl6" (OuterVolumeSpecName: "kube-api-access-lbxl6") pod "30df0e77-1e34-4685-80e6-9457028d7acb" (UID: "30df0e77-1e34-4685-80e6-9457028d7acb"). InnerVolumeSpecName "kube-api-access-lbxl6". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 17 00:38:24.080871 kubelet[2441]: I0517 00:38:24.080833 2441 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/30df0e77-1e34-4685-80e6-9457028d7acb-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "30df0e77-1e34-4685-80e6-9457028d7acb" (UID: "30df0e77-1e34-4685-80e6-9457028d7acb"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 17 00:38:24.095000 audit[5500]: NETFILTER_CFG table=filter:142 family=2 entries=67 op=nft_register_chain pid=5500 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:24.095000 audit[5500]: SYSCALL arch=c000003e syscall=46 success=yes exit=31852 a0=3 a1=7ffc028ea8a0 a2=0 a3=7ffc028ea88c items=0 ppid=3759 pid=5500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:24.095000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:24.100387 env[1439]: time="2025-05-17T00:38:24.100298191Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74d588d884-g64fh,Uid:48aa7aa9-2114-474d-ba3f-5b1471bfb687,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2\"" May 17 00:38:24.108680 env[1439]: time="2025-05-17T00:38:24.108646270Z" level=info msg="CreateContainer within sandbox \"724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:38:24.129671 env[1439]: 2025-05-17 00:38:23.969 [WARNING][5443] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--56455d8897--p8lqr-eth0" May 17 00:38:24.129671 env[1439]: 2025-05-17 00:38:23.969 [INFO][5443] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" May 17 00:38:24.129671 env[1439]: 2025-05-17 00:38:23.969 [INFO][5443] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" iface="eth0" netns="" May 17 00:38:24.129671 env[1439]: 2025-05-17 00:38:23.969 [INFO][5443] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" May 17 00:38:24.129671 env[1439]: 2025-05-17 00:38:23.969 [INFO][5443] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" May 17 00:38:24.129671 env[1439]: 2025-05-17 00:38:24.077 [INFO][5473] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" HandleID="k8s-pod-network.09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--56455d8897--p8lqr-eth0" May 17 00:38:24.129671 env[1439]: 2025-05-17 00:38:24.082 [INFO][5473] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:24.129671 env[1439]: 2025-05-17 00:38:24.090 [INFO][5473] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:24.129671 env[1439]: 2025-05-17 00:38:24.102 [WARNING][5473] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" HandleID="k8s-pod-network.09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--56455d8897--p8lqr-eth0" May 17 00:38:24.129671 env[1439]: 2025-05-17 00:38:24.102 [INFO][5473] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" HandleID="k8s-pod-network.09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--56455d8897--p8lqr-eth0" May 17 00:38:24.129671 env[1439]: 2025-05-17 00:38:24.119 [INFO][5473] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:24.129671 env[1439]: 2025-05-17 00:38:24.120 [INFO][5443] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" May 17 00:38:24.130271 kubelet[2441]: I0517 00:38:24.130244 2441 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:38:24.130377 kubelet[2441]: I0517 00:38:24.130285 2441 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:38:24.130536 env[1439]: time="2025-05-17T00:38:24.130496314Z" level=info msg="TearDown network for sandbox \"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\" successfully" May 17 00:38:24.130737 env[1439]: time="2025-05-17T00:38:24.130703413Z" level=info msg="StopPodSandbox for \"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\" returns successfully" May 17 00:38:24.131111 env[1439]: time="2025-05-17T00:38:24.131084812Z" level=info msg="RemovePodSandbox for \"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\"" May 17 00:38:24.131206 env[1439]: time="2025-05-17T00:38:24.131116512Z" level=info msg="Forcibly stopping sandbox \"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\"" May 17 00:38:24.164086 env[1439]: time="2025-05-17T00:38:24.163675829Z" level=info msg="CreateContainer within sandbox \"724a14b08076773d91bebac690a2f5624d35832e8a24375898a618f09f4c95f2\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"16a1d4a7a4181a3e26e76f2cceb690eaa76a2484f403a39212bedb280570c9cf\"" May 17 00:38:24.164632 env[1439]: time="2025-05-17T00:38:24.164597126Z" level=info msg="StartContainer for \"16a1d4a7a4181a3e26e76f2cceb690eaa76a2484f403a39212bedb280570c9cf\"" May 17 00:38:24.172074 kubelet[2441]: I0517 00:38:24.172012 2441 reconciler_common.go:299] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/30df0e77-1e34-4685-80e6-9457028d7acb-calico-apiserver-certs\") on node \"ci-3510.3.7-n-191fd4fe6d\" DevicePath \"\"" May 17 00:38:24.172074 kubelet[2441]: I0517 00:38:24.172054 2441 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-lbxl6\" (UniqueName: \"kubernetes.io/projected/30df0e77-1e34-4685-80e6-9457028d7acb-kube-api-access-lbxl6\") on node \"ci-3510.3.7-n-191fd4fe6d\" DevicePath \"\"" May 17 00:38:24.214500 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e-rootfs.mount: Deactivated successfully. May 17 00:38:24.214625 systemd[1]: run-netns-cni\x2d5bca38d6\x2d5e07\x2d7e4a\x2d5b4f\x2d458e1d6d175d.mount: Deactivated successfully. May 17 00:38:24.214715 systemd[1]: var-lib-kubelet-pods-30df0e77\x2d1e34\x2d4685\x2d80e6\x2d9457028d7acb-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 17 00:38:24.214802 systemd[1]: var-lib-kubelet-pods-30df0e77\x2d1e34\x2d4685\x2d80e6\x2d9457028d7acb-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dlbxl6.mount: Deactivated successfully. May 17 00:38:24.249255 systemd[1]: Started cri-containerd-16a1d4a7a4181a3e26e76f2cceb690eaa76a2484f403a39212bedb280570c9cf.scope. May 17 00:38:24.303909 kubelet[2441]: I0517 00:38:24.300121 2441 scope.go:117] "RemoveContainer" containerID="567178a15c67aba3af1d3c3a52fcdee15e13ed155e0d9909df714c616eaa0223" May 17 00:38:24.304079 env[1439]: time="2025-05-17T00:38:24.302507873Z" level=info msg="RemoveContainer for \"567178a15c67aba3af1d3c3a52fcdee15e13ed155e0d9909df714c616eaa0223\"" May 17 00:38:24.308076 systemd[1]: Removed slice kubepods-besteffort-pod30df0e77_1e34_4685_80e6_9457028d7acb.slice. May 17 00:38:24.308211 systemd[1]: kubepods-besteffort-pod30df0e77_1e34_4685_80e6_9457028d7acb.slice: Consumed 1.455s CPU time. May 17 00:38:24.314075 env[1439]: time="2025-05-17T00:38:24.314027744Z" level=info msg="RemoveContainer for \"567178a15c67aba3af1d3c3a52fcdee15e13ed155e0d9909df714c616eaa0223\" returns successfully" May 17 00:38:24.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.317000 audit: BPF prog-id=232 op=LOAD May 17 00:38:24.319000 audit[5523]: AVC avc: denied { bpf } for pid=5523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5435 pid=5523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:24.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136613164346137613431383161336532366537366632636365623639 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { perfmon } for pid=5523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5435 pid=5523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:24.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136613164346137613431383161336532366537366632636365623639 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { bpf } for pid=5523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { bpf } for pid=5523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { bpf } for pid=5523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { perfmon } for pid=5523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { perfmon } for pid=5523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { perfmon } for pid=5523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { perfmon } for pid=5523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { perfmon } for pid=5523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { bpf } for pid=5523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { bpf } for pid=5523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit: BPF prog-id=233 op=LOAD May 17 00:38:24.319000 audit[5523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002838b0 items=0 ppid=5435 pid=5523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:24.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136613164346137613431383161336532366537366632636365623639 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { bpf } for pid=5523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { bpf } for pid=5523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { perfmon } for pid=5523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { perfmon } for pid=5523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { perfmon } for pid=5523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { perfmon } for pid=5523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { perfmon } for pid=5523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { bpf } for pid=5523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { bpf } for pid=5523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit: BPF prog-id=234 op=LOAD May 17 00:38:24.319000 audit[5523]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002838f8 items=0 ppid=5435 pid=5523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:24.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136613164346137613431383161336532366537366632636365623639 May 17 00:38:24.319000 audit: BPF prog-id=234 op=UNLOAD May 17 00:38:24.319000 audit: BPF prog-id=233 op=UNLOAD May 17 00:38:24.319000 audit[5523]: AVC avc: denied { bpf } for pid=5523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { bpf } for pid=5523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { bpf } for pid=5523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { perfmon } for pid=5523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { perfmon } for pid=5523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { perfmon } for pid=5523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { perfmon } for pid=5523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { perfmon } for pid=5523 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { bpf } for pid=5523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit[5523]: AVC avc: denied { bpf } for pid=5523 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:38:24.319000 audit: BPF prog-id=235 op=LOAD May 17 00:38:24.319000 audit[5523]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000283d08 items=0 ppid=5435 pid=5523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:24.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136613164346137613431383161336532366537366632636365623639 May 17 00:38:24.328707 kubelet[2441]: I0517 00:38:24.328450 2441 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-fccc4" podStartSLOduration=31.03332316 podStartE2EDuration="46.328430107s" podCreationTimestamp="2025-05-17 00:37:38 +0000 UTC" firstStartedPulling="2025-05-17 00:38:07.938377193 +0000 UTC m=+51.040169214" lastFinishedPulling="2025-05-17 00:38:23.23348404 +0000 UTC m=+66.335276161" observedRunningTime="2025-05-17 00:38:24.325664914 +0000 UTC m=+67.427457035" watchObservedRunningTime="2025-05-17 00:38:24.328430107 +0000 UTC m=+67.430222128" May 17 00:38:24.331191 env[1439]: 2025-05-17 00:38:24.194 [WARNING][5510] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--56455d8897--p8lqr-eth0" May 17 00:38:24.331191 env[1439]: 2025-05-17 00:38:24.194 [INFO][5510] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" May 17 00:38:24.331191 env[1439]: 2025-05-17 00:38:24.194 [INFO][5510] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" iface="eth0" netns="" May 17 00:38:24.331191 env[1439]: 2025-05-17 00:38:24.194 [INFO][5510] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" May 17 00:38:24.331191 env[1439]: 2025-05-17 00:38:24.194 [INFO][5510] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" May 17 00:38:24.331191 env[1439]: 2025-05-17 00:38:24.306 [INFO][5527] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" HandleID="k8s-pod-network.09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--56455d8897--p8lqr-eth0" May 17 00:38:24.331191 env[1439]: 2025-05-17 00:38:24.307 [INFO][5527] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:24.331191 env[1439]: 2025-05-17 00:38:24.307 [INFO][5527] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:24.331191 env[1439]: 2025-05-17 00:38:24.324 [WARNING][5527] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" HandleID="k8s-pod-network.09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--56455d8897--p8lqr-eth0" May 17 00:38:24.331191 env[1439]: 2025-05-17 00:38:24.324 [INFO][5527] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" HandleID="k8s-pod-network.09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-whisker--56455d8897--p8lqr-eth0" May 17 00:38:24.331191 env[1439]: 2025-05-17 00:38:24.328 [INFO][5527] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:24.331191 env[1439]: 2025-05-17 00:38:24.329 [INFO][5510] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46" May 17 00:38:24.331740 env[1439]: time="2025-05-17T00:38:24.331223600Z" level=info msg="TearDown network for sandbox \"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\" successfully" May 17 00:38:24.342134 env[1439]: time="2025-05-17T00:38:24.342092172Z" level=info msg="RemovePodSandbox \"09fe67befd8fabe25a87d979ae83f8d1764091f5969d095cd6ac251f02224f46\" returns successfully" May 17 00:38:24.342657 env[1439]: time="2025-05-17T00:38:24.342625470Z" level=info msg="StopPodSandbox for \"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\"" May 17 00:38:24.403863 env[1439]: time="2025-05-17T00:38:24.403805314Z" level=info msg="StartContainer for \"16a1d4a7a4181a3e26e76f2cceb690eaa76a2484f403a39212bedb280570c9cf\" returns successfully" May 17 00:38:24.468179 env[1439]: 2025-05-17 00:38:24.422 [WARNING][5553] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0", GenerateName:"calico-kube-controllers-695b995796-", Namespace:"calico-system", SelfLink:"", UID:"0275e303-b9b6-4751-bc08-2a8efdaebb11", ResourceVersion:"1111", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"695b995796", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd", Pod:"calico-kube-controllers-695b995796-2gnrg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.85.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif67e189de16", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:24.468179 env[1439]: 2025-05-17 00:38:24.423 [INFO][5553] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" May 17 00:38:24.468179 env[1439]: 2025-05-17 00:38:24.423 [INFO][5553] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" iface="eth0" netns="" May 17 00:38:24.468179 env[1439]: 2025-05-17 00:38:24.424 [INFO][5553] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" May 17 00:38:24.468179 env[1439]: 2025-05-17 00:38:24.424 [INFO][5553] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" May 17 00:38:24.468179 env[1439]: 2025-05-17 00:38:24.456 [INFO][5569] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" HandleID="k8s-pod-network.655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0" May 17 00:38:24.468179 env[1439]: 2025-05-17 00:38:24.456 [INFO][5569] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:24.468179 env[1439]: 2025-05-17 00:38:24.456 [INFO][5569] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:24.468179 env[1439]: 2025-05-17 00:38:24.463 [WARNING][5569] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" HandleID="k8s-pod-network.655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0" May 17 00:38:24.468179 env[1439]: 2025-05-17 00:38:24.463 [INFO][5569] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" HandleID="k8s-pod-network.655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0" May 17 00:38:24.468179 env[1439]: 2025-05-17 00:38:24.465 [INFO][5569] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:24.468179 env[1439]: 2025-05-17 00:38:24.466 [INFO][5553] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" May 17 00:38:24.468888 env[1439]: time="2025-05-17T00:38:24.468222349Z" level=info msg="TearDown network for sandbox \"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\" successfully" May 17 00:38:24.468888 env[1439]: time="2025-05-17T00:38:24.468261749Z" level=info msg="StopPodSandbox for \"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\" returns successfully" May 17 00:38:24.468888 env[1439]: time="2025-05-17T00:38:24.468754048Z" level=info msg="RemovePodSandbox for \"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\"" May 17 00:38:24.468888 env[1439]: time="2025-05-17T00:38:24.468793447Z" level=info msg="Forcibly stopping sandbox \"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\"" May 17 00:38:24.595607 env[1439]: 2025-05-17 00:38:24.545 [WARNING][5583] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0", GenerateName:"calico-kube-controllers-695b995796-", Namespace:"calico-system", SelfLink:"", UID:"0275e303-b9b6-4751-bc08-2a8efdaebb11", ResourceVersion:"1111", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"695b995796", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"cb459bfaf7e1a57fcc57ab2aedf89445d60b555e6e314bcb0b85176b111339cd", Pod:"calico-kube-controllers-695b995796-2gnrg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.85.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif67e189de16", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:24.595607 env[1439]: 2025-05-17 00:38:24.545 [INFO][5583] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" May 17 00:38:24.595607 env[1439]: 2025-05-17 00:38:24.545 [INFO][5583] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" iface="eth0" netns="" May 17 00:38:24.595607 env[1439]: 2025-05-17 00:38:24.545 [INFO][5583] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" May 17 00:38:24.595607 env[1439]: 2025-05-17 00:38:24.545 [INFO][5583] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" May 17 00:38:24.595607 env[1439]: 2025-05-17 00:38:24.583 [INFO][5590] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" HandleID="k8s-pod-network.655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0" May 17 00:38:24.595607 env[1439]: 2025-05-17 00:38:24.583 [INFO][5590] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:24.595607 env[1439]: 2025-05-17 00:38:24.583 [INFO][5590] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:24.595607 env[1439]: 2025-05-17 00:38:24.590 [WARNING][5590] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" HandleID="k8s-pod-network.655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0" May 17 00:38:24.595607 env[1439]: 2025-05-17 00:38:24.590 [INFO][5590] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" HandleID="k8s-pod-network.655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--kube--controllers--695b995796--2gnrg-eth0" May 17 00:38:24.595607 env[1439]: 2025-05-17 00:38:24.592 [INFO][5590] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:24.595607 env[1439]: 2025-05-17 00:38:24.594 [INFO][5583] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157" May 17 00:38:24.595607 env[1439]: time="2025-05-17T00:38:24.595585023Z" level=info msg="TearDown network for sandbox \"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\" successfully" May 17 00:38:24.605653 env[1439]: time="2025-05-17T00:38:24.605566497Z" level=info msg="RemovePodSandbox \"655edca9c0950d1b3dfbc44a1ba89126bbb11a06431e4e7eb88e585ad6ec5157\" returns successfully" May 17 00:38:24.606192 env[1439]: time="2025-05-17T00:38:24.606153796Z" level=info msg="StopPodSandbox for \"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\"" May 17 00:38:24.712836 env[1439]: 2025-05-17 00:38:24.662 [WARNING][5605] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"8dfb2f5b-365c-4be9-abc4-56ee0d856953", ResourceVersion:"993", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661", Pod:"coredns-668d6bf9bc-z2hcl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali47acec6d416", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:24.712836 env[1439]: 2025-05-17 00:38:24.662 [INFO][5605] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" May 17 00:38:24.712836 env[1439]: 2025-05-17 00:38:24.662 [INFO][5605] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" iface="eth0" netns="" May 17 00:38:24.712836 env[1439]: 2025-05-17 00:38:24.663 [INFO][5605] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" May 17 00:38:24.712836 env[1439]: 2025-05-17 00:38:24.663 [INFO][5605] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" May 17 00:38:24.712836 env[1439]: 2025-05-17 00:38:24.697 [INFO][5613] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" HandleID="k8s-pod-network.cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0" May 17 00:38:24.712836 env[1439]: 2025-05-17 00:38:24.697 [INFO][5613] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:24.712836 env[1439]: 2025-05-17 00:38:24.697 [INFO][5613] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:24.712836 env[1439]: 2025-05-17 00:38:24.706 [WARNING][5613] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" HandleID="k8s-pod-network.cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0" May 17 00:38:24.712836 env[1439]: 2025-05-17 00:38:24.706 [INFO][5613] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" HandleID="k8s-pod-network.cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0" May 17 00:38:24.712836 env[1439]: 2025-05-17 00:38:24.709 [INFO][5613] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:24.712836 env[1439]: 2025-05-17 00:38:24.711 [INFO][5605] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" May 17 00:38:24.713863 env[1439]: time="2025-05-17T00:38:24.713812320Z" level=info msg="TearDown network for sandbox \"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\" successfully" May 17 00:38:24.713988 env[1439]: time="2025-05-17T00:38:24.713967120Z" level=info msg="StopPodSandbox for \"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\" returns successfully" May 17 00:38:24.716774 env[1439]: time="2025-05-17T00:38:24.716737613Z" level=info msg="RemovePodSandbox for \"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\"" May 17 00:38:24.716990 env[1439]: time="2025-05-17T00:38:24.716925612Z" level=info msg="Forcibly stopping sandbox \"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\"" May 17 00:38:24.852037 env[1439]: 2025-05-17 00:38:24.792 [WARNING][5635] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"8dfb2f5b-365c-4be9-abc4-56ee0d856953", ResourceVersion:"993", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"e4f479b71a4ba6b1ad4f9cf82ff96f6bc1fd369e886171737808ef8387ba0661", Pod:"coredns-668d6bf9bc-z2hcl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.85.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali47acec6d416", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:24.852037 env[1439]: 2025-05-17 00:38:24.793 [INFO][5635] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" May 17 00:38:24.852037 env[1439]: 2025-05-17 00:38:24.793 [INFO][5635] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" iface="eth0" netns="" May 17 00:38:24.852037 env[1439]: 2025-05-17 00:38:24.793 [INFO][5635] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" May 17 00:38:24.852037 env[1439]: 2025-05-17 00:38:24.793 [INFO][5635] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" May 17 00:38:24.852037 env[1439]: 2025-05-17 00:38:24.835 [INFO][5643] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" HandleID="k8s-pod-network.cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0" May 17 00:38:24.852037 env[1439]: 2025-05-17 00:38:24.835 [INFO][5643] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:24.852037 env[1439]: 2025-05-17 00:38:24.835 [INFO][5643] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:24.852037 env[1439]: 2025-05-17 00:38:24.845 [WARNING][5643] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" HandleID="k8s-pod-network.cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0" May 17 00:38:24.852037 env[1439]: 2025-05-17 00:38:24.846 [INFO][5643] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" HandleID="k8s-pod-network.cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-coredns--668d6bf9bc--z2hcl-eth0" May 17 00:38:24.852037 env[1439]: 2025-05-17 00:38:24.847 [INFO][5643] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:24.852037 env[1439]: 2025-05-17 00:38:24.850 [INFO][5635] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722" May 17 00:38:24.854487 env[1439]: time="2025-05-17T00:38:24.854439160Z" level=info msg="TearDown network for sandbox \"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\" successfully" May 17 00:38:24.864034 env[1439]: time="2025-05-17T00:38:24.863996136Z" level=info msg="RemovePodSandbox \"cad9e6e4dc4e814aa95415ee65b3610386e376a0a18b6ad942d195906018d722\" returns successfully" May 17 00:38:24.864761 env[1439]: time="2025-05-17T00:38:24.864734134Z" level=info msg="StopPodSandbox for \"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\"" May 17 00:38:24.979714 env[1439]: 2025-05-17 00:38:24.928 [WARNING][5659] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0", GenerateName:"calico-apiserver-74d588d884-", Namespace:"calico-apiserver", SelfLink:"", UID:"4e44aa06-40b1-4eaf-95c2-202522049069", ResourceVersion:"1129", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74d588d884", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74", Pod:"calico-apiserver-74d588d884-vsm27", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali489bebedfe3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:24.979714 env[1439]: 2025-05-17 00:38:24.929 [INFO][5659] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" May 17 00:38:24.979714 env[1439]: 2025-05-17 00:38:24.929 [INFO][5659] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" iface="eth0" netns="" May 17 00:38:24.979714 env[1439]: 2025-05-17 00:38:24.929 [INFO][5659] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" May 17 00:38:24.979714 env[1439]: 2025-05-17 00:38:24.929 [INFO][5659] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" May 17 00:38:24.979714 env[1439]: 2025-05-17 00:38:24.963 [INFO][5666] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" HandleID="k8s-pod-network.2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0" May 17 00:38:24.979714 env[1439]: 2025-05-17 00:38:24.963 [INFO][5666] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:24.979714 env[1439]: 2025-05-17 00:38:24.963 [INFO][5666] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:24.979714 env[1439]: 2025-05-17 00:38:24.974 [WARNING][5666] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" HandleID="k8s-pod-network.2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0" May 17 00:38:24.979714 env[1439]: 2025-05-17 00:38:24.974 [INFO][5666] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" HandleID="k8s-pod-network.2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0" May 17 00:38:24.979714 env[1439]: 2025-05-17 00:38:24.976 [INFO][5666] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:24.979714 env[1439]: 2025-05-17 00:38:24.978 [INFO][5659] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" May 17 00:38:24.980637 env[1439]: time="2025-05-17T00:38:24.980586537Z" level=info msg="TearDown network for sandbox \"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\" successfully" May 17 00:38:24.980753 env[1439]: time="2025-05-17T00:38:24.980729737Z" level=info msg="StopPodSandbox for \"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\" returns successfully" May 17 00:38:24.981380 env[1439]: time="2025-05-17T00:38:24.981334335Z" level=info msg="RemovePodSandbox for \"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\"" May 17 00:38:24.981603 env[1439]: time="2025-05-17T00:38:24.981541835Z" level=info msg="Forcibly stopping sandbox \"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\"" May 17 00:38:24.996304 kubelet[2441]: I0517 00:38:24.995939 2441 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="30df0e77-1e34-4685-80e6-9457028d7acb" path="/var/lib/kubelet/pods/30df0e77-1e34-4685-80e6-9457028d7acb/volumes" May 17 00:38:25.117468 env[1439]: 2025-05-17 00:38:25.050 [WARNING][5681] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0", GenerateName:"calico-apiserver-74d588d884-", Namespace:"calico-apiserver", SelfLink:"", UID:"4e44aa06-40b1-4eaf-95c2-202522049069", ResourceVersion:"1129", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74d588d884", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"db40ea9eaf00c1ca0e05efa03205bd8abf4d9529f599af7e62cf391e6b28ef74", Pod:"calico-apiserver-74d588d884-vsm27", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.85.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali489bebedfe3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:25.117468 env[1439]: 2025-05-17 00:38:25.051 [INFO][5681] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" May 17 00:38:25.117468 env[1439]: 2025-05-17 00:38:25.051 [INFO][5681] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" iface="eth0" netns="" May 17 00:38:25.117468 env[1439]: 2025-05-17 00:38:25.051 [INFO][5681] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" May 17 00:38:25.117468 env[1439]: 2025-05-17 00:38:25.051 [INFO][5681] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" May 17 00:38:25.117468 env[1439]: 2025-05-17 00:38:25.094 [INFO][5688] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" HandleID="k8s-pod-network.2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0" May 17 00:38:25.117468 env[1439]: 2025-05-17 00:38:25.094 [INFO][5688] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:25.117468 env[1439]: 2025-05-17 00:38:25.094 [INFO][5688] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:25.117468 env[1439]: 2025-05-17 00:38:25.110 [WARNING][5688] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" HandleID="k8s-pod-network.2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0" May 17 00:38:25.117468 env[1439]: 2025-05-17 00:38:25.110 [INFO][5688] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" HandleID="k8s-pod-network.2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74d588d884--vsm27-eth0" May 17 00:38:25.117468 env[1439]: 2025-05-17 00:38:25.114 [INFO][5688] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:25.117468 env[1439]: 2025-05-17 00:38:25.115 [INFO][5681] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8" May 17 00:38:25.118291 env[1439]: time="2025-05-17T00:38:25.118237589Z" level=info msg="TearDown network for sandbox \"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\" successfully" May 17 00:38:25.126312 env[1439]: time="2025-05-17T00:38:25.126261069Z" level=info msg="RemovePodSandbox \"2a3cbcbfcc22c54d3a2fb95f5c069d25f754fe25b9fb4c40982aa816a07c49a8\" returns successfully" May 17 00:38:25.127041 env[1439]: time="2025-05-17T00:38:25.127011467Z" level=info msg="StopPodSandbox for \"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\"" May 17 00:38:25.267697 env[1439]: 2025-05-17 00:38:25.207 [WARNING][5705] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ebc6cbc0-e584-4665-8b37-7cb92cbebceb", ResourceVersion:"1188", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e", Pod:"csi-node-driver-fccc4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.85.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliba31e42061e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:25.267697 env[1439]: 2025-05-17 00:38:25.208 [INFO][5705] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" May 17 00:38:25.267697 env[1439]: 2025-05-17 00:38:25.208 [INFO][5705] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" iface="eth0" netns="" May 17 00:38:25.267697 env[1439]: 2025-05-17 00:38:25.208 [INFO][5705] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" May 17 00:38:25.267697 env[1439]: 2025-05-17 00:38:25.208 [INFO][5705] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" May 17 00:38:25.267697 env[1439]: 2025-05-17 00:38:25.251 [INFO][5712] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" HandleID="k8s-pod-network.8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0" May 17 00:38:25.267697 env[1439]: 2025-05-17 00:38:25.251 [INFO][5712] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:25.267697 env[1439]: 2025-05-17 00:38:25.251 [INFO][5712] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:25.267697 env[1439]: 2025-05-17 00:38:25.261 [WARNING][5712] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" HandleID="k8s-pod-network.8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0" May 17 00:38:25.267697 env[1439]: 2025-05-17 00:38:25.262 [INFO][5712] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" HandleID="k8s-pod-network.8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0" May 17 00:38:25.267697 env[1439]: 2025-05-17 00:38:25.264 [INFO][5712] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:25.267697 env[1439]: 2025-05-17 00:38:25.266 [INFO][5705] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" May 17 00:38:25.268566 env[1439]: time="2025-05-17T00:38:25.268525010Z" level=info msg="TearDown network for sandbox \"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\" successfully" May 17 00:38:25.268668 env[1439]: time="2025-05-17T00:38:25.268648210Z" level=info msg="StopPodSandbox for \"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\" returns successfully" May 17 00:38:25.269304 env[1439]: time="2025-05-17T00:38:25.269271908Z" level=info msg="RemovePodSandbox for \"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\"" May 17 00:38:25.269638 env[1439]: time="2025-05-17T00:38:25.269581207Z" level=info msg="Forcibly stopping sandbox \"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\"" May 17 00:38:25.325822 kubelet[2441]: I0517 00:38:25.325272 2441 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-74d588d884-g64fh" podStartSLOduration=6.325252867 podStartE2EDuration="6.325252867s" podCreationTimestamp="2025-05-17 00:38:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:38:25.323226972 +0000 UTC m=+68.425018993" watchObservedRunningTime="2025-05-17 00:38:25.325252867 +0000 UTC m=+68.427044888" May 17 00:38:25.407990 env[1439]: 2025-05-17 00:38:25.345 [WARNING][5726] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ebc6cbc0-e584-4665-8b37-7cb92cbebceb", ResourceVersion:"1188", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-191fd4fe6d", ContainerID:"b55eda1aa1e4f187e6436e488cee862126884478c2a0a1963b420a4322ac7f5e", Pod:"csi-node-driver-fccc4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.85.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliba31e42061e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:25.407990 env[1439]: 2025-05-17 00:38:25.346 [INFO][5726] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" May 17 00:38:25.407990 env[1439]: 2025-05-17 00:38:25.346 [INFO][5726] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" iface="eth0" netns="" May 17 00:38:25.407990 env[1439]: 2025-05-17 00:38:25.346 [INFO][5726] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" May 17 00:38:25.407990 env[1439]: 2025-05-17 00:38:25.346 [INFO][5726] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" May 17 00:38:25.407990 env[1439]: 2025-05-17 00:38:25.382 [INFO][5734] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" HandleID="k8s-pod-network.8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0" May 17 00:38:25.407990 env[1439]: 2025-05-17 00:38:25.383 [INFO][5734] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:25.407990 env[1439]: 2025-05-17 00:38:25.383 [INFO][5734] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:25.407990 env[1439]: 2025-05-17 00:38:25.400 [WARNING][5734] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" HandleID="k8s-pod-network.8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0" May 17 00:38:25.407990 env[1439]: 2025-05-17 00:38:25.401 [INFO][5734] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" HandleID="k8s-pod-network.8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-csi--node--driver--fccc4-eth0" May 17 00:38:25.407990 env[1439]: 2025-05-17 00:38:25.403 [INFO][5734] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:25.407990 env[1439]: 2025-05-17 00:38:25.404 [INFO][5726] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5" May 17 00:38:25.409161 env[1439]: time="2025-05-17T00:38:25.409115855Z" level=info msg="TearDown network for sandbox \"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\" successfully" May 17 00:38:25.420260 env[1439]: time="2025-05-17T00:38:25.420220527Z" level=info msg="RemovePodSandbox \"8073c66b40c8edb15ede88231cbce8adc947e8d51aa1585d198a311710ff84d5\" returns successfully" May 17 00:38:25.441711 kernel: kauditd_printk_skb: 176 callbacks suppressed May 17 00:38:25.441832 kernel: audit: type=1325 audit(1747442305.424:1472): table=filter:143 family=2 entries=12 op=nft_register_rule pid=5740 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:25.424000 audit[5740]: NETFILTER_CFG table=filter:143 family=2 entries=12 op=nft_register_rule pid=5740 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:25.424000 audit[5740]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffcf68fd460 a2=0 a3=7ffcf68fd44c items=0 ppid=2549 pid=5740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:25.461361 kernel: audit: type=1300 audit(1747442305.424:1472): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffcf68fd460 a2=0 a3=7ffcf68fd44c items=0 ppid=2549 pid=5740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:25.424000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:25.473521 kernel: audit: type=1327 audit(1747442305.424:1472): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:25.464000 audit[5740]: NETFILTER_CFG table=nat:144 family=2 entries=30 op=nft_register_rule pid=5740 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:25.486371 kernel: audit: type=1325 audit(1747442305.464:1473): table=nat:144 family=2 entries=30 op=nft_register_rule pid=5740 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:25.464000 audit[5740]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffcf68fd460 a2=0 a3=7ffcf68fd44c items=0 ppid=2549 pid=5740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:25.464000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:25.524202 kernel: audit: type=1300 audit(1747442305.464:1473): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffcf68fd460 a2=0 a3=7ffcf68fd44c items=0 ppid=2549 pid=5740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:25.524305 kernel: audit: type=1327 audit(1747442305.464:1473): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:25.576607 systemd-networkd[1588]: calic5a4e6f1a65: Gained IPv6LL May 17 00:38:27.026000 audit[5539]: AVC avc: denied { watch } for pid=5539 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_38_19.3485883070/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c573,c770 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c573,c770 tclass=file permissive=0 May 17 00:38:27.046365 kernel: audit: type=1400 audit(1747442307.026:1474): avc: denied { watch } for pid=5539 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_38_19.3485883070/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c573,c770 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c573,c770 tclass=file permissive=0 May 17 00:38:27.026000 audit[5539]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00083eda0 a2=fc6 a3=0 items=0 ppid=5435 pid=5539 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c573,c770 key=(null) May 17 00:38:27.072355 kernel: audit: type=1300 audit(1747442307.026:1474): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00083eda0 a2=fc6 a3=0 items=0 ppid=5435 pid=5539 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c573,c770 key=(null) May 17 00:38:27.026000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:38:27.090358 kernel: audit: type=1327 audit(1747442307.026:1474): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:38:27.379563 kubelet[2441]: I0517 00:38:27.379524 2441 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:38:27.381364 env[1439]: time="2025-05-17T00:38:27.380838945Z" level=info msg="StopContainer for \"eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f\" with timeout 30 (s)" May 17 00:38:27.381364 env[1439]: time="2025-05-17T00:38:27.381245944Z" level=info msg="Stop container \"eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f\" with signal terminated" May 17 00:38:27.411000 audit[5750]: NETFILTER_CFG table=filter:145 family=2 entries=12 op=nft_register_rule pid=5750 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:27.424367 kernel: audit: type=1325 audit(1747442307.411:1475): table=filter:145 family=2 entries=12 op=nft_register_rule pid=5750 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:27.411000 audit[5750]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffdd622b7f0 a2=0 a3=7ffdd622b7dc items=0 ppid=2549 pid=5750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:27.411000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:27.432000 audit[5750]: NETFILTER_CFG table=nat:146 family=2 entries=34 op=nft_register_chain pid=5750 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:27.432000 audit[5750]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffdd622b7f0 a2=0 a3=7ffdd622b7dc items=0 ppid=2549 pid=5750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:27.432000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:27.441282 systemd[1]: cri-containerd-eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f.scope: Deactivated successfully. May 17 00:38:27.440000 audit: BPF prog-id=210 op=UNLOAD May 17 00:38:27.444000 audit: BPF prog-id=213 op=UNLOAD May 17 00:38:27.453000 audit[5757]: NETFILTER_CFG table=filter:147 family=2 entries=12 op=nft_register_rule pid=5757 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:27.453000 audit[5757]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffcf4552360 a2=0 a3=7ffcf455234c items=0 ppid=2549 pid=5757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:27.453000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:27.459000 audit[5757]: NETFILTER_CFG table=nat:148 family=2 entries=36 op=nft_register_rule pid=5757 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:27.459000 audit[5757]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffcf4552360 a2=0 a3=7ffcf455234c items=0 ppid=2549 pid=5757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:27.459000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:27.469605 env[1439]: time="2025-05-17T00:38:27.469560028Z" level=info msg="shim disconnected" id=eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f May 17 00:38:27.469818 env[1439]: time="2025-05-17T00:38:27.469791927Z" level=warning msg="cleaning up after shim disconnected" id=eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f namespace=k8s.io May 17 00:38:27.469939 env[1439]: time="2025-05-17T00:38:27.469922527Z" level=info msg="cleaning up dead shim" May 17 00:38:27.475156 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f-rootfs.mount: Deactivated successfully. May 17 00:38:27.485657 env[1439]: time="2025-05-17T00:38:27.485613488Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:38:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5764 runtime=io.containerd.runc.v2\n" May 17 00:38:27.586810 env[1439]: time="2025-05-17T00:38:27.586758140Z" level=info msg="StopContainer for \"eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f\" returns successfully" May 17 00:38:27.587713 env[1439]: time="2025-05-17T00:38:27.587678638Z" level=info msg="StopPodSandbox for \"f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f\"" May 17 00:38:27.587932 env[1439]: time="2025-05-17T00:38:27.587899838Z" level=info msg="Container to stop \"eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 17 00:38:27.592902 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f-shm.mount: Deactivated successfully. May 17 00:38:27.601378 systemd[1]: cri-containerd-f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f.scope: Deactivated successfully. May 17 00:38:27.600000 audit: BPF prog-id=178 op=UNLOAD May 17 00:38:27.605000 audit: BPF prog-id=181 op=UNLOAD May 17 00:38:27.646849 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f-rootfs.mount: Deactivated successfully. May 17 00:38:27.651480 env[1439]: time="2025-05-17T00:38:27.651432282Z" level=info msg="shim disconnected" id=f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f May 17 00:38:27.651652 env[1439]: time="2025-05-17T00:38:27.651630781Z" level=warning msg="cleaning up after shim disconnected" id=f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f namespace=k8s.io May 17 00:38:27.651735 env[1439]: time="2025-05-17T00:38:27.651721681Z" level=info msg="cleaning up dead shim" May 17 00:38:27.665644 env[1439]: time="2025-05-17T00:38:27.665605747Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:38:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5796 runtime=io.containerd.runc.v2\n" May 17 00:38:27.751938 systemd-networkd[1588]: calic5c2536fc78: Link DOWN May 17 00:38:27.751947 systemd-networkd[1588]: calic5c2536fc78: Lost carrier May 17 00:38:27.837000 audit[5840]: NETFILTER_CFG table=filter:149 family=2 entries=63 op=nft_register_rule pid=5840 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:27.837000 audit[5840]: SYSCALL arch=c000003e syscall=46 success=yes exit=10252 a0=3 a1=7ffe49e8b2a0 a2=0 a3=7ffe49e8b28c items=0 ppid=3759 pid=5840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:27.837000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:27.838000 audit[5840]: NETFILTER_CFG table=filter:150 family=2 entries=4 op=nft_unregister_chain pid=5840 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:27.838000 audit[5840]: SYSCALL arch=c000003e syscall=46 success=yes exit=560 a0=3 a1=7ffe49e8b2a0 a2=0 a3=55c3283e8000 items=0 ppid=3759 pid=5840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:27.838000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:27.871061 env[1439]: 2025-05-17 00:38:27.746 [INFO][5819] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" May 17 00:38:27.871061 env[1439]: 2025-05-17 00:38:27.746 [INFO][5819] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" iface="eth0" netns="/var/run/netns/cni-07fa515a-2d04-5a7e-671a-8f996ffc1239" May 17 00:38:27.871061 env[1439]: 2025-05-17 00:38:27.746 [INFO][5819] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" iface="eth0" netns="/var/run/netns/cni-07fa515a-2d04-5a7e-671a-8f996ffc1239" May 17 00:38:27.871061 env[1439]: 2025-05-17 00:38:27.760 [INFO][5819] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" after=13.576566ms iface="eth0" netns="/var/run/netns/cni-07fa515a-2d04-5a7e-671a-8f996ffc1239" May 17 00:38:27.871061 env[1439]: 2025-05-17 00:38:27.760 [INFO][5819] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" May 17 00:38:27.871061 env[1439]: 2025-05-17 00:38:27.760 [INFO][5819] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" May 17 00:38:27.871061 env[1439]: 2025-05-17 00:38:27.820 [INFO][5830] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" HandleID="k8s-pod-network.f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:38:27.871061 env[1439]: 2025-05-17 00:38:27.820 [INFO][5830] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:27.871061 env[1439]: 2025-05-17 00:38:27.820 [INFO][5830] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:27.871061 env[1439]: 2025-05-17 00:38:27.866 [INFO][5830] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" HandleID="k8s-pod-network.f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:38:27.871061 env[1439]: 2025-05-17 00:38:27.866 [INFO][5830] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" HandleID="k8s-pod-network.f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:38:27.871061 env[1439]: 2025-05-17 00:38:27.867 [INFO][5830] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:27.871061 env[1439]: 2025-05-17 00:38:27.869 [INFO][5819] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" May 17 00:38:27.876099 systemd[1]: run-netns-cni\x2d07fa515a\x2d2d04\x2d5a7e\x2d671a\x2d8f996ffc1239.mount: Deactivated successfully. May 17 00:38:27.878099 env[1439]: time="2025-05-17T00:38:27.878048027Z" level=info msg="TearDown network for sandbox \"f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f\" successfully" May 17 00:38:27.878238 env[1439]: time="2025-05-17T00:38:27.878213826Z" level=info msg="StopPodSandbox for \"f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f\" returns successfully" May 17 00:38:28.001891 kubelet[2441]: I0517 00:38:28.001766 2441 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-cq4ln\" (UniqueName: \"kubernetes.io/projected/f7311dad-530c-4ead-87b1-cc9be9e8f9e6-kube-api-access-cq4ln\") pod \"f7311dad-530c-4ead-87b1-cc9be9e8f9e6\" (UID: \"f7311dad-530c-4ead-87b1-cc9be9e8f9e6\") " May 17 00:38:28.002681 kubelet[2441]: I0517 00:38:28.002655 2441 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f7311dad-530c-4ead-87b1-cc9be9e8f9e6-calico-apiserver-certs\") pod \"f7311dad-530c-4ead-87b1-cc9be9e8f9e6\" (UID: \"f7311dad-530c-4ead-87b1-cc9be9e8f9e6\") " May 17 00:38:28.011413 systemd[1]: var-lib-kubelet-pods-f7311dad\x2d530c\x2d4ead\x2d87b1\x2dcc9be9e8f9e6-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 17 00:38:28.015371 kubelet[2441]: I0517 00:38:28.015324 2441 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/f7311dad-530c-4ead-87b1-cc9be9e8f9e6-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "f7311dad-530c-4ead-87b1-cc9be9e8f9e6" (UID: "f7311dad-530c-4ead-87b1-cc9be9e8f9e6"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 17 00:38:28.016377 kubelet[2441]: I0517 00:38:28.016347 2441 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/f7311dad-530c-4ead-87b1-cc9be9e8f9e6-kube-api-access-cq4ln" (OuterVolumeSpecName: "kube-api-access-cq4ln") pod "f7311dad-530c-4ead-87b1-cc9be9e8f9e6" (UID: "f7311dad-530c-4ead-87b1-cc9be9e8f9e6"). InnerVolumeSpecName "kube-api-access-cq4ln". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 17 00:38:28.103811 kubelet[2441]: I0517 00:38:28.103768 2441 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-cq4ln\" (UniqueName: \"kubernetes.io/projected/f7311dad-530c-4ead-87b1-cc9be9e8f9e6-kube-api-access-cq4ln\") on node \"ci-3510.3.7-n-191fd4fe6d\" DevicePath \"\"" May 17 00:38:28.103811 kubelet[2441]: I0517 00:38:28.103803 2441 reconciler_common.go:299] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f7311dad-530c-4ead-87b1-cc9be9e8f9e6-calico-apiserver-certs\") on node \"ci-3510.3.7-n-191fd4fe6d\" DevicePath \"\"" May 17 00:38:28.324811 kubelet[2441]: I0517 00:38:28.323545 2441 scope.go:117] "RemoveContainer" containerID="eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f" May 17 00:38:28.326973 env[1439]: time="2025-05-17T00:38:28.326594239Z" level=info msg="RemoveContainer for \"eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f\"" May 17 00:38:28.330465 systemd[1]: Removed slice kubepods-besteffort-podf7311dad_530c_4ead_87b1_cc9be9e8f9e6.slice. May 17 00:38:28.337216 env[1439]: time="2025-05-17T00:38:28.337179613Z" level=info msg="RemoveContainer for \"eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f\" returns successfully" May 17 00:38:28.337498 kubelet[2441]: I0517 00:38:28.337364 2441 scope.go:117] "RemoveContainer" containerID="eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f" May 17 00:38:28.337687 env[1439]: time="2025-05-17T00:38:28.337551912Z" level=error msg="ContainerStatus for \"eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f\": not found" May 17 00:38:28.337815 kubelet[2441]: E0517 00:38:28.337791 2441 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f\": not found" containerID="eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f" May 17 00:38:28.337902 kubelet[2441]: I0517 00:38:28.337822 2441 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f"} err="failed to get container status \"eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f\": rpc error: code = NotFound desc = an error occurred when try to find container \"eabb2a5294c7209d129537085fddbf7cb306566f9286be164cd83822a9e26c8f\": not found" May 17 00:38:28.475166 systemd[1]: var-lib-kubelet-pods-f7311dad\x2d530c\x2d4ead\x2d87b1\x2dcc9be9e8f9e6-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dcq4ln.mount: Deactivated successfully. May 17 00:38:28.516000 audit[5845]: NETFILTER_CFG table=filter:151 family=2 entries=12 op=nft_register_rule pid=5845 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:28.516000 audit[5845]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff9fbfb890 a2=0 a3=7fff9fbfb87c items=0 ppid=2549 pid=5845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:28.516000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:28.521000 audit[5845]: NETFILTER_CFG table=nat:152 family=2 entries=36 op=nft_register_rule pid=5845 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:28.521000 audit[5845]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff9fbfb890 a2=0 a3=7fff9fbfb87c items=0 ppid=2549 pid=5845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:28.521000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:28.993313 kubelet[2441]: I0517 00:38:28.993272 2441 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="f7311dad-530c-4ead-87b1-cc9be9e8f9e6" path="/var/lib/kubelet/pods/f7311dad-530c-4ead-87b1-cc9be9e8f9e6/volumes" May 17 00:38:29.991778 env[1439]: time="2025-05-17T00:38:29.991736948Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:38:30.177924 env[1439]: time="2025-05-17T00:38:30.177839410Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:38:30.184470 env[1439]: time="2025-05-17T00:38:30.184407695Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:38:30.184942 kubelet[2441]: E0517 00:38:30.184891 2441 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:38:30.185425 kubelet[2441]: E0517 00:38:30.185383 2441 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:38:30.186231 kubelet[2441]: E0517 00:38:30.186160 2441 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-8r4bq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-zjc4h_calico-system(68e18fcd-7ed4-4596-bb1d-407a2a0928fe): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:38:30.187589 kubelet[2441]: E0517 00:38:30.187542 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-zjc4h" podUID="68e18fcd-7ed4-4596-bb1d-407a2a0928fe" May 17 00:38:34.888984 systemd[1]: run-containerd-runc-k8s.io-e357c28ad19aa8f717feec3fbae98d960c7a6b9ea3bd9d202b02e0f1443e0b0b-runc.IDk7hf.mount: Deactivated successfully. May 17 00:38:34.994424 kubelet[2441]: E0517 00:38:34.994334 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-b8dc5df5c-7xlwx" podUID="1be837ab-f6c8-4d7d-9976-b853d9b4b123" May 17 00:38:41.180819 systemd[1]: run-containerd-runc-k8s.io-16152d2ae5a50bcbce2b59da84611f8e999414e7a82e1a35ef4f131b958df4b5-runc.ckVZjd.mount: Deactivated successfully. May 17 00:38:44.992171 kubelet[2441]: E0517 00:38:44.992026 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-zjc4h" podUID="68e18fcd-7ed4-4596-bb1d-407a2a0928fe" May 17 00:38:46.292436 systemd[1]: run-containerd-runc-k8s.io-16152d2ae5a50bcbce2b59da84611f8e999414e7a82e1a35ef4f131b958df4b5-runc.RN9171.mount: Deactivated successfully. May 17 00:38:47.992417 env[1439]: time="2025-05-17T00:38:47.992370996Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:38:48.173849 env[1439]: time="2025-05-17T00:38:48.173774449Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:38:48.178116 env[1439]: time="2025-05-17T00:38:48.178060740Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:38:48.178391 kubelet[2441]: E0517 00:38:48.178333 2441 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:38:48.178868 kubelet[2441]: E0517 00:38:48.178834 2441 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:38:48.179613 kubelet[2441]: E0517 00:38:48.179553 2441 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:390ed499d1204bf499760421b62bf110,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-fzjs4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-b8dc5df5c-7xlwx_calico-system(1be837ab-f6c8-4d7d-9976-b853d9b4b123): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:38:48.181920 env[1439]: time="2025-05-17T00:38:48.181884933Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:38:48.368641 env[1439]: time="2025-05-17T00:38:48.368594875Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:38:48.372587 env[1439]: time="2025-05-17T00:38:48.372525068Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:38:48.372965 kubelet[2441]: E0517 00:38:48.372925 2441 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:38:48.373154 kubelet[2441]: E0517 00:38:48.373130 2441 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:38:48.373933 kubelet[2441]: E0517 00:38:48.373871 2441 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fzjs4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-b8dc5df5c-7xlwx_calico-system(1be837ab-f6c8-4d7d-9976-b853d9b4b123): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:38:48.375332 kubelet[2441]: E0517 00:38:48.375293 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-b8dc5df5c-7xlwx" podUID="1be837ab-f6c8-4d7d-9976-b853d9b4b123" May 17 00:38:59.992643 env[1439]: time="2025-05-17T00:38:59.992570957Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:39:00.172722 env[1439]: time="2025-05-17T00:39:00.172560344Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:39:00.176907 env[1439]: time="2025-05-17T00:39:00.176853537Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:39:00.177131 kubelet[2441]: E0517 00:39:00.177085 2441 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:39:00.177580 kubelet[2441]: E0517 00:39:00.177147 2441 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:39:00.177580 kubelet[2441]: E0517 00:39:00.177318 2441 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-8r4bq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-zjc4h_calico-system(68e18fcd-7ed4-4596-bb1d-407a2a0928fe): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:39:00.178941 kubelet[2441]: E0517 00:39:00.178886 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-zjc4h" podUID="68e18fcd-7ed4-4596-bb1d-407a2a0928fe" May 17 00:39:02.993655 kubelet[2441]: E0517 00:39:02.993195 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-b8dc5df5c-7xlwx" podUID="1be837ab-f6c8-4d7d-9976-b853d9b4b123" May 17 00:39:10.991466 kubelet[2441]: E0517 00:39:10.991352 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-zjc4h" podUID="68e18fcd-7ed4-4596-bb1d-407a2a0928fe" May 17 00:39:12.411000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:12.416732 kernel: kauditd_printk_skb: 27 callbacks suppressed May 17 00:39:12.416848 kernel: audit: type=1400 audit(1747442352.411:1487): avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:12.411000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:12.449212 kernel: audit: type=1400 audit(1747442352.411:1488): avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:12.449438 kernel: audit: type=1300 audit(1747442352.411:1488): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002a48690 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:39:12.411000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002a48690 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:39:12.411000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:39:12.476368 kernel: audit: type=1327 audit(1747442352.411:1488): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:39:12.411000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00144ce80 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:39:12.492364 kernel: audit: type=1300 audit(1747442352.411:1487): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00144ce80 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:39:12.411000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:39:12.526097 kernel: audit: type=1327 audit(1747442352.411:1487): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:39:12.906000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:12.924424 kernel: audit: type=1400 audit(1747442352.906:1490): avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:12.924548 kernel: audit: type=1400 audit(1747442352.906:1489): avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:12.906000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:12.906000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c0076f7b60 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:39:12.938371 kernel: audit: type=1300 audit(1747442352.906:1489): arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c0076f7b60 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:39:12.955412 kernel: audit: type=1327 audit(1747442352.906:1489): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:39:12.906000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:39:12.906000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c00a9e1500 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:39:12.906000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:39:12.980000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:12.980000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00a37d560 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:39:12.980000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:39:12.988000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:12.988000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:12.988000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c00a37d580 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:39:12.988000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:39:12.988000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c013c9c0c0 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:39:12.988000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:39:12.992000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:12.992000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00a9e1890 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:39:12.992000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:39:15.992191 kubelet[2441]: E0517 00:39:15.992133 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-b8dc5df5c-7xlwx" podUID="1be837ab-f6c8-4d7d-9976-b853d9b4b123" May 17 00:39:18.118000 audit[4930]: AVC avc: denied { watch } for pid=4930 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_37_50.638250015/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c643 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c264,c643 tclass=file permissive=0 May 17 00:39:18.124844 kernel: kauditd_printk_skb: 14 callbacks suppressed May 17 00:39:18.124947 kernel: audit: type=1400 audit(1747442358.118:1495): avc: denied { watch } for pid=4930 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_37_50.638250015/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c643 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c264,c643 tclass=file permissive=0 May 17 00:39:18.118000 audit[4930]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00109b800 a2=fc6 a3=0 items=0 ppid=4422 pid=4930 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c643 key=(null) May 17 00:39:18.141369 kernel: audit: type=1300 audit(1747442358.118:1495): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00109b800 a2=fc6 a3=0 items=0 ppid=4422 pid=4930 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c643 key=(null) May 17 00:39:18.118000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:39:18.174667 kernel: audit: type=1327 audit(1747442358.118:1495): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:39:20.085000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:20.085000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b2ac80 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:39:20.119583 kernel: audit: type=1400 audit(1747442360.085:1496): avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:20.119697 kernel: audit: type=1300 audit(1747442360.085:1496): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b2ac80 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:39:20.085000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:39:20.135265 kernel: audit: type=1327 audit(1747442360.085:1496): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:39:20.085000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:20.149370 kernel: audit: type=1400 audit(1747442360.085:1497): avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:20.085000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00144d580 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:39:20.085000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:39:20.182752 kernel: audit: type=1300 audit(1747442360.085:1497): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00144d580 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:39:20.182824 kernel: audit: type=1327 audit(1747442360.085:1497): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:39:20.182861 kernel: audit: type=1400 audit(1747442360.085:1498): avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:20.085000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:20.085000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00144d720 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:39:20.085000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:39:20.087000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:39:20.087000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00144d8c0 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:39:20.087000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:39:23.991608 kubelet[2441]: E0517 00:39:23.991545 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-zjc4h" podUID="68e18fcd-7ed4-4596-bb1d-407a2a0928fe" May 17 00:39:25.424053 env[1439]: time="2025-05-17T00:39:25.424005850Z" level=info msg="StopPodSandbox for \"f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f\"" May 17 00:39:25.484120 env[1439]: 2025-05-17 00:39:25.453 [WARNING][5983] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:39:25.484120 env[1439]: 2025-05-17 00:39:25.453 [INFO][5983] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" May 17 00:39:25.484120 env[1439]: 2025-05-17 00:39:25.453 [INFO][5983] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" iface="eth0" netns="" May 17 00:39:25.484120 env[1439]: 2025-05-17 00:39:25.453 [INFO][5983] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" May 17 00:39:25.484120 env[1439]: 2025-05-17 00:39:25.453 [INFO][5983] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" May 17 00:39:25.484120 env[1439]: 2025-05-17 00:39:25.473 [INFO][5990] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" HandleID="k8s-pod-network.f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:39:25.484120 env[1439]: 2025-05-17 00:39:25.474 [INFO][5990] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:39:25.484120 env[1439]: 2025-05-17 00:39:25.474 [INFO][5990] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:39:25.484120 env[1439]: 2025-05-17 00:39:25.479 [WARNING][5990] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" HandleID="k8s-pod-network.f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:39:25.484120 env[1439]: 2025-05-17 00:39:25.479 [INFO][5990] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" HandleID="k8s-pod-network.f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:39:25.484120 env[1439]: 2025-05-17 00:39:25.482 [INFO][5990] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:39:25.484120 env[1439]: 2025-05-17 00:39:25.483 [INFO][5983] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" May 17 00:39:25.484643 env[1439]: time="2025-05-17T00:39:25.484209417Z" level=info msg="TearDown network for sandbox \"f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f\" successfully" May 17 00:39:25.484643 env[1439]: time="2025-05-17T00:39:25.484253119Z" level=info msg="StopPodSandbox for \"f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f\" returns successfully" May 17 00:39:25.485058 env[1439]: time="2025-05-17T00:39:25.485024446Z" level=info msg="RemovePodSandbox for \"f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f\"" May 17 00:39:25.485162 env[1439]: time="2025-05-17T00:39:25.485064848Z" level=info msg="Forcibly stopping sandbox \"f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f\"" May 17 00:39:25.551182 env[1439]: 2025-05-17 00:39:25.522 [WARNING][6004] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:39:25.551182 env[1439]: 2025-05-17 00:39:25.522 [INFO][6004] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" May 17 00:39:25.551182 env[1439]: 2025-05-17 00:39:25.522 [INFO][6004] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" iface="eth0" netns="" May 17 00:39:25.551182 env[1439]: 2025-05-17 00:39:25.522 [INFO][6004] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" May 17 00:39:25.551182 env[1439]: 2025-05-17 00:39:25.522 [INFO][6004] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" May 17 00:39:25.551182 env[1439]: 2025-05-17 00:39:25.541 [INFO][6012] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" HandleID="k8s-pod-network.f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:39:25.551182 env[1439]: 2025-05-17 00:39:25.541 [INFO][6012] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:39:25.551182 env[1439]: 2025-05-17 00:39:25.541 [INFO][6012] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:39:25.551182 env[1439]: 2025-05-17 00:39:25.547 [WARNING][6012] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" HandleID="k8s-pod-network.f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:39:25.551182 env[1439]: 2025-05-17 00:39:25.547 [INFO][6012] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" HandleID="k8s-pod-network.f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--rst5w-eth0" May 17 00:39:25.551182 env[1439]: 2025-05-17 00:39:25.548 [INFO][6012] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:39:25.551182 env[1439]: 2025-05-17 00:39:25.549 [INFO][6004] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f" May 17 00:39:25.551835 env[1439]: time="2025-05-17T00:39:25.551213429Z" level=info msg="TearDown network for sandbox \"f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f\" successfully" May 17 00:39:25.562793 env[1439]: time="2025-05-17T00:39:25.562751644Z" level=info msg="RemovePodSandbox \"f72bdf60b9fa0a74b1e5ef446f8bdcbbf98866041c65f5f34e5b17a1484f0d0f\" returns successfully" May 17 00:39:25.563231 env[1439]: time="2025-05-17T00:39:25.563201660Z" level=info msg="StopPodSandbox for \"70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e\"" May 17 00:39:25.632312 env[1439]: 2025-05-17 00:39:25.597 [WARNING][6026] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:39:25.632312 env[1439]: 2025-05-17 00:39:25.597 [INFO][6026] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" May 17 00:39:25.632312 env[1439]: 2025-05-17 00:39:25.597 [INFO][6026] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" iface="eth0" netns="" May 17 00:39:25.632312 env[1439]: 2025-05-17 00:39:25.597 [INFO][6026] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" May 17 00:39:25.632312 env[1439]: 2025-05-17 00:39:25.597 [INFO][6026] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" May 17 00:39:25.632312 env[1439]: 2025-05-17 00:39:25.621 [INFO][6033] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" HandleID="k8s-pod-network.70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:39:25.632312 env[1439]: 2025-05-17 00:39:25.621 [INFO][6033] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:39:25.632312 env[1439]: 2025-05-17 00:39:25.622 [INFO][6033] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:39:25.632312 env[1439]: 2025-05-17 00:39:25.629 [WARNING][6033] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" HandleID="k8s-pod-network.70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:39:25.632312 env[1439]: 2025-05-17 00:39:25.629 [INFO][6033] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" HandleID="k8s-pod-network.70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:39:25.632312 env[1439]: 2025-05-17 00:39:25.630 [INFO][6033] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:39:25.632312 env[1439]: 2025-05-17 00:39:25.631 [INFO][6026] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" May 17 00:39:25.632904 env[1439]: time="2025-05-17T00:39:25.632363549Z" level=info msg="TearDown network for sandbox \"70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e\" successfully" May 17 00:39:25.632904 env[1439]: time="2025-05-17T00:39:25.632402951Z" level=info msg="StopPodSandbox for \"70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e\" returns successfully" May 17 00:39:25.633380 env[1439]: time="2025-05-17T00:39:25.633327184Z" level=info msg="RemovePodSandbox for \"70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e\"" May 17 00:39:25.633491 env[1439]: time="2025-05-17T00:39:25.633391486Z" level=info msg="Forcibly stopping sandbox \"70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e\"" May 17 00:39:25.702516 env[1439]: 2025-05-17 00:39:25.667 [WARNING][6047] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" WorkloadEndpoint="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:39:25.702516 env[1439]: 2025-05-17 00:39:25.668 [INFO][6047] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" May 17 00:39:25.702516 env[1439]: 2025-05-17 00:39:25.668 [INFO][6047] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" iface="eth0" netns="" May 17 00:39:25.702516 env[1439]: 2025-05-17 00:39:25.668 [INFO][6047] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" May 17 00:39:25.702516 env[1439]: 2025-05-17 00:39:25.668 [INFO][6047] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" May 17 00:39:25.702516 env[1439]: 2025-05-17 00:39:25.689 [INFO][6054] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" HandleID="k8s-pod-network.70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:39:25.702516 env[1439]: 2025-05-17 00:39:25.690 [INFO][6054] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:39:25.702516 env[1439]: 2025-05-17 00:39:25.690 [INFO][6054] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:39:25.702516 env[1439]: 2025-05-17 00:39:25.698 [WARNING][6054] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" HandleID="k8s-pod-network.70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:39:25.702516 env[1439]: 2025-05-17 00:39:25.698 [INFO][6054] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" HandleID="k8s-pod-network.70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" Workload="ci--3510.3.7--n--191fd4fe6d-k8s-calico--apiserver--74bc7c86ff--lcldf-eth0" May 17 00:39:25.702516 env[1439]: 2025-05-17 00:39:25.700 [INFO][6054] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:39:25.702516 env[1439]: 2025-05-17 00:39:25.701 [INFO][6047] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e" May 17 00:39:25.703653 env[1439]: time="2025-05-17T00:39:25.703592213Z" level=info msg="TearDown network for sandbox \"70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e\" successfully" May 17 00:39:25.720699 env[1439]: time="2025-05-17T00:39:25.720654627Z" level=info msg="RemovePodSandbox \"70eb61446e38aeac64cbf11f78716c43db7e4d0e89a5412c266e8568e8047c6e\" returns successfully" May 17 00:39:27.028000 audit[5539]: AVC avc: denied { watch } for pid=5539 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_38_19.3485883070/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c573,c770 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c573,c770 tclass=file permissive=0 May 17 00:39:27.034580 kernel: kauditd_printk_skb: 5 callbacks suppressed May 17 00:39:27.034688 kernel: audit: type=1400 audit(1747442367.028:1500): avc: denied { watch } for pid=5539 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_38_19.3485883070/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c573,c770 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c573,c770 tclass=file permissive=0 May 17 00:39:27.028000 audit[5539]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0016a1400 a2=fc6 a3=0 items=0 ppid=5435 pid=5539 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c573,c770 key=(null) May 17 00:39:27.077793 kernel: audit: type=1300 audit(1747442367.028:1500): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0016a1400 a2=fc6 a3=0 items=0 ppid=5435 pid=5539 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c573,c770 key=(null) May 17 00:39:27.028000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:39:27.092728 kernel: audit: type=1327 audit(1747442367.028:1500): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:39:30.993113 env[1439]: time="2025-05-17T00:39:30.992754099Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:39:31.173222 env[1439]: time="2025-05-17T00:39:31.173058753Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:39:31.176693 env[1439]: time="2025-05-17T00:39:31.176578669Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:39:31.176866 kubelet[2441]: E0517 00:39:31.176816 2441 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:39:31.177266 kubelet[2441]: E0517 00:39:31.176881 2441 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:39:31.177266 kubelet[2441]: E0517 00:39:31.177025 2441 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:390ed499d1204bf499760421b62bf110,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-fzjs4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-b8dc5df5c-7xlwx_calico-system(1be837ab-f6c8-4d7d-9976-b853d9b4b123): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:39:31.179532 env[1439]: time="2025-05-17T00:39:31.179485565Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:39:31.354256 env[1439]: time="2025-05-17T00:39:31.354108328Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:39:31.357680 env[1439]: time="2025-05-17T00:39:31.357631244Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:39:31.357921 kubelet[2441]: E0517 00:39:31.357877 2441 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:39:31.358015 kubelet[2441]: E0517 00:39:31.357942 2441 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:39:31.358134 kubelet[2441]: E0517 00:39:31.358093 2441 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fzjs4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-b8dc5df5c-7xlwx_calico-system(1be837ab-f6c8-4d7d-9976-b853d9b4b123): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:39:31.359655 kubelet[2441]: E0517 00:39:31.359608 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-b8dc5df5c-7xlwx" podUID="1be837ab-f6c8-4d7d-9976-b853d9b4b123" May 17 00:39:37.992892 kubelet[2441]: E0517 00:39:37.992532 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-zjc4h" podUID="68e18fcd-7ed4-4596-bb1d-407a2a0928fe" May 17 00:39:41.158334 systemd[1]: run-containerd-runc-k8s.io-16152d2ae5a50bcbce2b59da84611f8e999414e7a82e1a35ef4f131b958df4b5-runc.MuKiT6.mount: Deactivated successfully. May 17 00:39:41.521565 systemd[1]: Started sshd@7-10.200.4.17:22-10.200.16.10:43290.service. May 17 00:39:41.541512 kernel: audit: type=1130 audit(1747442381.521:1501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.4.17:22-10.200.16.10:43290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:41.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.4.17:22-10.200.16.10:43290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:42.121749 sshd[6125]: Accepted publickey for core from 10.200.16.10 port 43290 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:42.120000 audit[6125]: USER_ACCT pid=6125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:42.126977 sshd[6125]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:42.125000 audit[6125]: CRED_ACQ pid=6125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:42.154879 kernel: audit: type=1101 audit(1747442382.120:1502): pid=6125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:42.154983 kernel: audit: type=1103 audit(1747442382.125:1503): pid=6125 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:42.165246 kernel: audit: type=1006 audit(1747442382.125:1504): pid=6125 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 17 00:39:42.125000 audit[6125]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9cfe58d0 a2=3 a3=0 items=0 ppid=1 pid=6125 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:42.179658 systemd-logind[1422]: New session 10 of user core. May 17 00:39:42.181047 systemd[1]: Started session-10.scope. May 17 00:39:42.125000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:39:42.188941 kernel: audit: type=1300 audit(1747442382.125:1504): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9cfe58d0 a2=3 a3=0 items=0 ppid=1 pid=6125 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:42.189022 kernel: audit: type=1327 audit(1747442382.125:1504): proctitle=737368643A20636F7265205B707269765D May 17 00:39:42.185000 audit[6125]: USER_START pid=6125 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:42.189000 audit[6127]: CRED_ACQ pid=6127 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:42.225080 kernel: audit: type=1105 audit(1747442382.185:1505): pid=6125 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:42.225180 kernel: audit: type=1103 audit(1747442382.189:1506): pid=6127 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:42.678700 sshd[6125]: pam_unix(sshd:session): session closed for user core May 17 00:39:42.678000 audit[6125]: USER_END pid=6125 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:42.681656 systemd-logind[1422]: Session 10 logged out. Waiting for processes to exit. May 17 00:39:42.682880 systemd[1]: sshd@7-10.200.4.17:22-10.200.16.10:43290.service: Deactivated successfully. May 17 00:39:42.683673 systemd[1]: session-10.scope: Deactivated successfully. May 17 00:39:42.684801 systemd-logind[1422]: Removed session 10. May 17 00:39:42.678000 audit[6125]: CRED_DISP pid=6125 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:42.710558 kernel: audit: type=1106 audit(1747442382.678:1507): pid=6125 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:42.710676 kernel: audit: type=1104 audit(1747442382.678:1508): pid=6125 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:42.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.4.17:22-10.200.16.10:43290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:44.994566 kubelet[2441]: E0517 00:39:44.994511 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-b8dc5df5c-7xlwx" podUID="1be837ab-f6c8-4d7d-9976-b853d9b4b123" May 17 00:39:46.272948 systemd[1]: run-containerd-runc-k8s.io-16152d2ae5a50bcbce2b59da84611f8e999414e7a82e1a35ef4f131b958df4b5-runc.Wg7pbG.mount: Deactivated successfully. May 17 00:39:47.778333 systemd[1]: Started sshd@8-10.200.4.17:22-10.200.16.10:43300.service. May 17 00:39:47.788938 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:39:47.789041 kernel: audit: type=1130 audit(1747442387.777:1510): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.4.17:22-10.200.16.10:43300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:47.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.4.17:22-10.200.16.10:43300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:48.377000 audit[6157]: USER_ACCT pid=6157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.395396 kernel: audit: type=1101 audit(1747442388.377:1511): pid=6157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.395460 sshd[6157]: Accepted publickey for core from 10.200.16.10 port 43300 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:48.395669 sshd[6157]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:48.378000 audit[6157]: CRED_ACQ pid=6157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.400920 systemd[1]: Started session-11.scope. May 17 00:39:48.402236 systemd-logind[1422]: New session 11 of user core. May 17 00:39:48.420577 kernel: audit: type=1103 audit(1747442388.378:1512): pid=6157 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.420681 kernel: audit: type=1006 audit(1747442388.378:1513): pid=6157 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 17 00:39:48.420714 kernel: audit: type=1300 audit(1747442388.378:1513): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9728ed30 a2=3 a3=0 items=0 ppid=1 pid=6157 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.378000 audit[6157]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9728ed30 a2=3 a3=0 items=0 ppid=1 pid=6157 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:48.378000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:39:48.440797 kernel: audit: type=1327 audit(1747442388.378:1513): proctitle=737368643A20636F7265205B707269765D May 17 00:39:48.440891 kernel: audit: type=1105 audit(1747442388.407:1514): pid=6157 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.407000 audit[6157]: USER_START pid=6157 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.409000 audit[6161]: CRED_ACQ pid=6161 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.471376 kernel: audit: type=1103 audit(1747442388.409:1515): pid=6161 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.861778 sshd[6157]: pam_unix(sshd:session): session closed for user core May 17 00:39:48.862000 audit[6157]: USER_END pid=6157 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.868870 systemd[1]: sshd@8-10.200.4.17:22-10.200.16.10:43300.service: Deactivated successfully. May 17 00:39:48.869699 systemd[1]: session-11.scope: Deactivated successfully. May 17 00:39:48.871198 systemd-logind[1422]: Session 11 logged out. Waiting for processes to exit. May 17 00:39:48.872179 systemd-logind[1422]: Removed session 11. May 17 00:39:48.862000 audit[6157]: CRED_DISP pid=6157 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.893971 kernel: audit: type=1106 audit(1747442388.862:1516): pid=6157 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.894062 kernel: audit: type=1104 audit(1747442388.862:1517): pid=6157 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:48.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.4.17:22-10.200.16.10:43300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:49.992878 env[1439]: time="2025-05-17T00:39:49.992806188Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:39:50.189792 env[1439]: time="2025-05-17T00:39:50.189721655Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:39:50.193220 env[1439]: time="2025-05-17T00:39:50.193142541Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:39:50.193487 kubelet[2441]: E0517 00:39:50.193438 2441 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:39:50.193902 kubelet[2441]: E0517 00:39:50.193505 2441 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:39:50.193902 kubelet[2441]: E0517 00:39:50.193686 2441 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-8r4bq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-zjc4h_calico-system(68e18fcd-7ed4-4596-bb1d-407a2a0928fe): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:39:50.195366 kubelet[2441]: E0517 00:39:50.195269 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-zjc4h" podUID="68e18fcd-7ed4-4596-bb1d-407a2a0928fe" May 17 00:39:53.980985 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:39:53.981123 kernel: audit: type=1130 audit(1747442393.960:1519): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.4.17:22-10.200.16.10:46302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:53.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.4.17:22-10.200.16.10:46302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:53.961523 systemd[1]: Started sshd@9-10.200.4.17:22-10.200.16.10:46302.service. May 17 00:39:54.568000 audit[6172]: USER_ACCT pid=6172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:54.572912 sshd[6172]: Accepted publickey for core from 10.200.16.10 port 46302 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:39:54.587000 audit[6172]: CRED_ACQ pid=6172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:54.589596 sshd[6172]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:39:54.594885 systemd[1]: Started session-12.scope. May 17 00:39:54.595920 systemd-logind[1422]: New session 12 of user core. May 17 00:39:54.604807 kernel: audit: type=1101 audit(1747442394.568:1520): pid=6172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:54.604903 kernel: audit: type=1103 audit(1747442394.587:1521): pid=6172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:54.613726 kernel: audit: type=1006 audit(1747442394.587:1522): pid=6172 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 17 00:39:54.587000 audit[6172]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf1061f40 a2=3 a3=0 items=0 ppid=1 pid=6172 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:54.614369 kernel: audit: type=1300 audit(1747442394.587:1522): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf1061f40 a2=3 a3=0 items=0 ppid=1 pid=6172 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:39:54.629786 kernel: audit: type=1327 audit(1747442394.587:1522): proctitle=737368643A20636F7265205B707269765D May 17 00:39:54.587000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:39:54.600000 audit[6172]: USER_START pid=6172 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:54.650853 kernel: audit: type=1105 audit(1747442394.600:1523): pid=6172 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:54.650943 kernel: audit: type=1103 audit(1747442394.602:1524): pid=6174 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:54.602000 audit[6174]: CRED_ACQ pid=6174 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:55.067370 sshd[6172]: pam_unix(sshd:session): session closed for user core May 17 00:39:55.067000 audit[6172]: USER_END pid=6172 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:55.071303 systemd-logind[1422]: Session 12 logged out. Waiting for processes to exit. May 17 00:39:55.073092 systemd[1]: sshd@9-10.200.4.17:22-10.200.16.10:46302.service: Deactivated successfully. May 17 00:39:55.074034 systemd[1]: session-12.scope: Deactivated successfully. May 17 00:39:55.075721 systemd-logind[1422]: Removed session 12. May 17 00:39:55.088375 kernel: audit: type=1106 audit(1747442395.067:1525): pid=6172 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:55.067000 audit[6172]: CRED_DISP pid=6172 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:55.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.4.17:22-10.200.16.10:46302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:39:55.108915 kernel: audit: type=1104 audit(1747442395.067:1526): pid=6172 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:39:57.992888 kubelet[2441]: E0517 00:39:57.992829 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-b8dc5df5c-7xlwx" podUID="1be837ab-f6c8-4d7d-9976-b853d9b4b123" May 17 00:40:00.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.4.17:22-10.200.16.10:55756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:00.168351 systemd[1]: Started sshd@10-10.200.4.17:22-10.200.16.10:55756.service. May 17 00:40:00.173524 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:40:00.173600 kernel: audit: type=1130 audit(1747442400.167:1528): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.4.17:22-10.200.16.10:55756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:00.769000 audit[6186]: USER_ACCT pid=6186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:00.771468 sshd[6186]: Accepted publickey for core from 10.200.16.10 port 55756 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:00.776037 sshd[6186]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:00.788623 kernel: audit: type=1101 audit(1747442400.769:1529): pid=6186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:00.774000 audit[6186]: CRED_ACQ pid=6186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:00.798931 systemd[1]: Started session-13.scope. May 17 00:40:00.800065 systemd-logind[1422]: New session 13 of user core. May 17 00:40:00.816802 kernel: audit: type=1103 audit(1747442400.774:1530): pid=6186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:00.816891 kernel: audit: type=1006 audit(1747442400.774:1531): pid=6186 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 17 00:40:00.774000 audit[6186]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3bfecee0 a2=3 a3=0 items=0 ppid=1 pid=6186 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:00.831961 kernel: audit: type=1300 audit(1747442400.774:1531): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3bfecee0 a2=3 a3=0 items=0 ppid=1 pid=6186 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:00.832025 kernel: audit: type=1327 audit(1747442400.774:1531): proctitle=737368643A20636F7265205B707269765D May 17 00:40:00.774000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:00.804000 audit[6186]: USER_START pid=6186 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:00.853355 kernel: audit: type=1105 audit(1747442400.804:1532): pid=6186 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:00.853426 kernel: audit: type=1103 audit(1747442400.815:1533): pid=6188 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:00.815000 audit[6188]: CRED_ACQ pid=6188 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:01.263997 sshd[6186]: pam_unix(sshd:session): session closed for user core May 17 00:40:01.264000 audit[6186]: USER_END pid=6186 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:01.267187 systemd[1]: sshd@10-10.200.4.17:22-10.200.16.10:55756.service: Deactivated successfully. May 17 00:40:01.268017 systemd[1]: session-13.scope: Deactivated successfully. May 17 00:40:01.269705 systemd-logind[1422]: Session 13 logged out. Waiting for processes to exit. May 17 00:40:01.270647 systemd-logind[1422]: Removed session 13. May 17 00:40:01.282377 kernel: audit: type=1106 audit(1747442401.264:1534): pid=6186 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:01.282453 kernel: audit: type=1104 audit(1747442401.264:1535): pid=6186 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:01.264000 audit[6186]: CRED_DISP pid=6186 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:01.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.4.17:22-10.200.16.10:55756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:01.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.4.17:22-10.200.16.10:55758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:01.363122 systemd[1]: Started sshd@11-10.200.4.17:22-10.200.16.10:55758.service. May 17 00:40:01.955000 audit[6199]: USER_ACCT pid=6199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:01.957381 sshd[6199]: Accepted publickey for core from 10.200.16.10 port 55758 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:01.957000 audit[6199]: CRED_ACQ pid=6199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:01.957000 audit[6199]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd03ea1770 a2=3 a3=0 items=0 ppid=1 pid=6199 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:01.957000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:01.959255 sshd[6199]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:01.965125 systemd-logind[1422]: New session 14 of user core. May 17 00:40:01.965658 systemd[1]: Started session-14.scope. May 17 00:40:01.969000 audit[6199]: USER_START pid=6199 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:01.970000 audit[6201]: CRED_ACQ pid=6201 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:02.472653 sshd[6199]: pam_unix(sshd:session): session closed for user core May 17 00:40:02.472000 audit[6199]: USER_END pid=6199 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:02.473000 audit[6199]: CRED_DISP pid=6199 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:02.476022 systemd[1]: sshd@11-10.200.4.17:22-10.200.16.10:55758.service: Deactivated successfully. May 17 00:40:02.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.4.17:22-10.200.16.10:55758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:02.477055 systemd[1]: session-14.scope: Deactivated successfully. May 17 00:40:02.477761 systemd-logind[1422]: Session 14 logged out. Waiting for processes to exit. May 17 00:40:02.478582 systemd-logind[1422]: Removed session 14. May 17 00:40:02.583035 systemd[1]: Started sshd@12-10.200.4.17:22-10.200.16.10:55764.service. May 17 00:40:02.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.4.17:22-10.200.16.10:55764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:02.991246 kubelet[2441]: E0517 00:40:02.991204 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-zjc4h" podUID="68e18fcd-7ed4-4596-bb1d-407a2a0928fe" May 17 00:40:03.179000 audit[6209]: USER_ACCT pid=6209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:03.180762 sshd[6209]: Accepted publickey for core from 10.200.16.10 port 55764 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:03.180000 audit[6209]: CRED_ACQ pid=6209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:03.181000 audit[6209]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7a8018e0 a2=3 a3=0 items=0 ppid=1 pid=6209 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:03.181000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:03.183089 sshd[6209]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:03.189021 systemd-logind[1422]: New session 15 of user core. May 17 00:40:03.189874 systemd[1]: Started session-15.scope. May 17 00:40:03.193000 audit[6209]: USER_START pid=6209 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:03.195000 audit[6211]: CRED_ACQ pid=6211 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:03.656694 sshd[6209]: pam_unix(sshd:session): session closed for user core May 17 00:40:03.656000 audit[6209]: USER_END pid=6209 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:03.657000 audit[6209]: CRED_DISP pid=6209 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:03.660724 systemd[1]: sshd@12-10.200.4.17:22-10.200.16.10:55764.service: Deactivated successfully. May 17 00:40:03.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.4.17:22-10.200.16.10:55764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:03.661828 systemd[1]: session-15.scope: Deactivated successfully. May 17 00:40:03.662580 systemd-logind[1422]: Session 15 logged out. Waiting for processes to exit. May 17 00:40:03.663444 systemd-logind[1422]: Removed session 15. May 17 00:40:04.881254 systemd[1]: run-containerd-runc-k8s.io-e357c28ad19aa8f717feec3fbae98d960c7a6b9ea3bd9d202b02e0f1443e0b0b-runc.G7ICz4.mount: Deactivated successfully. May 17 00:40:08.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.4.17:22-10.200.16.10:50408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:08.758859 systemd[1]: Started sshd@13-10.200.4.17:22-10.200.16.10:50408.service. May 17 00:40:08.764182 kernel: kauditd_printk_skb: 23 callbacks suppressed May 17 00:40:08.764279 kernel: audit: type=1130 audit(1747442408.758:1555): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.4.17:22-10.200.16.10:50408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:08.992274 kubelet[2441]: E0517 00:40:08.992204 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-b8dc5df5c-7xlwx" podUID="1be837ab-f6c8-4d7d-9976-b853d9b4b123" May 17 00:40:09.357000 audit[6248]: USER_ACCT pid=6248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:09.376839 sshd[6248]: Accepted publickey for core from 10.200.16.10 port 50408 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:09.377275 sshd[6248]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:09.377560 kernel: audit: type=1101 audit(1747442409.357:1556): pid=6248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:09.377604 kernel: audit: type=1103 audit(1747442409.375:1557): pid=6248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:09.375000 audit[6248]: CRED_ACQ pid=6248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:09.382790 systemd[1]: Started session-16.scope. May 17 00:40:09.384056 systemd-logind[1422]: New session 16 of user core. May 17 00:40:09.401619 kernel: audit: type=1006 audit(1747442409.375:1558): pid=6248 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 17 00:40:09.375000 audit[6248]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd863c2400 a2=3 a3=0 items=0 ppid=1 pid=6248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.417517 kernel: audit: type=1300 audit(1747442409.375:1558): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd863c2400 a2=3 a3=0 items=0 ppid=1 pid=6248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:09.375000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:09.418356 kernel: audit: type=1327 audit(1747442409.375:1558): proctitle=737368643A20636F7265205B707269765D May 17 00:40:09.387000 audit[6248]: USER_START pid=6248 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:09.423461 kernel: audit: type=1105 audit(1747442409.387:1559): pid=6248 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:09.390000 audit[6250]: CRED_ACQ pid=6250 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:09.452503 kernel: audit: type=1103 audit(1747442409.390:1560): pid=6250 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:09.865269 sshd[6248]: pam_unix(sshd:session): session closed for user core May 17 00:40:09.865000 audit[6248]: USER_END pid=6248 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:09.868913 systemd-logind[1422]: Session 16 logged out. Waiting for processes to exit. May 17 00:40:09.870158 systemd[1]: sshd@13-10.200.4.17:22-10.200.16.10:50408.service: Deactivated successfully. May 17 00:40:09.870945 systemd[1]: session-16.scope: Deactivated successfully. May 17 00:40:09.872390 systemd-logind[1422]: Removed session 16. May 17 00:40:09.865000 audit[6248]: CRED_DISP pid=6248 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:09.898264 kernel: audit: type=1106 audit(1747442409.865:1561): pid=6248 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:09.898360 kernel: audit: type=1104 audit(1747442409.865:1562): pid=6248 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:09.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.4.17:22-10.200.16.10:50408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:12.412000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:12.412000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:12.412000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001606f00 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:40:12.412000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:40:12.412000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00094ef00 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:40:12.412000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:40:12.909000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:12.909000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:12.909000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c0096e4720 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:40:12.909000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:40:12.909000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c009f2e6f0 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:40:12.909000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:40:12.981000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:12.981000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00a5d7480 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:40:12.981000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:40:12.990000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:12.990000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00a5d74c0 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:40:12.990000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:40:12.990000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:12.990000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c009f2e7e0 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:40:12.990000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:40:12.994000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:12.994000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c0096e48d0 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:40:12.994000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:40:14.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.4.17:22-10.200.16.10:50412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:14.969629 systemd[1]: Started sshd@14-10.200.4.17:22-10.200.16.10:50412.service. May 17 00:40:14.990521 kernel: kauditd_printk_skb: 25 callbacks suppressed May 17 00:40:14.990631 kernel: audit: type=1130 audit(1747442414.969:1572): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.4.17:22-10.200.16.10:50412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:15.576000 audit[6259]: USER_ACCT pid=6259 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:15.594104 sshd[6259]: Accepted publickey for core from 10.200.16.10 port 50412 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:15.594460 kernel: audit: type=1101 audit(1747442415.576:1573): pid=6259 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:15.594602 sshd[6259]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:15.593000 audit[6259]: CRED_ACQ pid=6259 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:15.600211 systemd[1]: Started session-17.scope. May 17 00:40:15.601506 systemd-logind[1422]: New session 17 of user core. May 17 00:40:15.611364 kernel: audit: type=1103 audit(1747442415.593:1574): pid=6259 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:15.611435 kernel: audit: type=1006 audit(1747442415.593:1575): pid=6259 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 17 00:40:15.593000 audit[6259]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe687d8fb0 a2=3 a3=0 items=0 ppid=1 pid=6259 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:15.641895 kernel: audit: type=1300 audit(1747442415.593:1575): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe687d8fb0 a2=3 a3=0 items=0 ppid=1 pid=6259 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:15.593000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:15.605000 audit[6259]: USER_START pid=6259 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:15.664609 kernel: audit: type=1327 audit(1747442415.593:1575): proctitle=737368643A20636F7265205B707269765D May 17 00:40:15.664681 kernel: audit: type=1105 audit(1747442415.605:1576): pid=6259 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:15.664716 kernel: audit: type=1103 audit(1747442415.605:1577): pid=6261 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:15.605000 audit[6261]: CRED_ACQ pid=6261 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:16.068533 sshd[6259]: pam_unix(sshd:session): session closed for user core May 17 00:40:16.069000 audit[6259]: USER_END pid=6259 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:16.072146 systemd[1]: sshd@14-10.200.4.17:22-10.200.16.10:50412.service: Deactivated successfully. May 17 00:40:16.073138 systemd[1]: session-17.scope: Deactivated successfully. May 17 00:40:16.074971 systemd-logind[1422]: Session 17 logged out. Waiting for processes to exit. May 17 00:40:16.075951 systemd-logind[1422]: Removed session 17. May 17 00:40:16.069000 audit[6259]: CRED_DISP pid=6259 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:16.100115 kernel: audit: type=1106 audit(1747442416.069:1578): pid=6259 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:16.100194 kernel: audit: type=1104 audit(1747442416.069:1579): pid=6259 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:16.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.4.17:22-10.200.16.10:50412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:16.275191 systemd[1]: run-containerd-runc-k8s.io-16152d2ae5a50bcbce2b59da84611f8e999414e7a82e1a35ef4f131b958df4b5-runc.QSB8G0.mount: Deactivated successfully. May 17 00:40:17.991459 kubelet[2441]: E0517 00:40:17.991406 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-zjc4h" podUID="68e18fcd-7ed4-4596-bb1d-407a2a0928fe" May 17 00:40:18.121000 audit[4930]: AVC avc: denied { watch } for pid=4930 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_37_50.638250015/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c264,c643 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c264,c643 tclass=file permissive=0 May 17 00:40:18.121000 audit[4930]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001c5eca0 a2=fc6 a3=0 items=0 ppid=4422 pid=4930 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c264,c643 key=(null) May 17 00:40:18.121000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:40:20.108591 kernel: kauditd_printk_skb: 4 callbacks suppressed May 17 00:40:20.108756 kernel: audit: type=1400 audit(1747442420.087:1582): avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:20.087000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:20.087000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001918280 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:40:20.087000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:40:20.130365 kernel: audit: type=1300 audit(1747442420.087:1582): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001918280 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:40:20.130422 kernel: audit: type=1327 audit(1747442420.087:1582): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:40:20.087000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:20.158459 kernel: audit: type=1400 audit(1747442420.087:1583): avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:20.158549 kernel: audit: type=1300 audit(1747442420.087:1583): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019182a0 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:40:20.087000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019182a0 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:40:20.087000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:40:20.200676 kernel: audit: type=1327 audit(1747442420.087:1583): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:40:20.087000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:20.214796 kernel: audit: type=1400 audit(1747442420.087:1584): avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:20.214894 kernel: audit: type=1300 audit(1747442420.087:1584): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001918600 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:40:20.087000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001918600 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:40:20.087000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:40:20.249089 kernel: audit: type=1327 audit(1747442420.087:1584): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:40:20.108000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:20.267368 kernel: audit: type=1400 audit(1747442420.108:1585): avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:40:20.108000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001dbe4c0 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:40:20.108000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:40:21.168336 systemd[1]: Started sshd@15-10.200.4.17:22-10.200.16.10:49104.service. May 17 00:40:21.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.4.17:22-10.200.16.10:49104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:21.765000 audit[6294]: USER_ACCT pid=6294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:21.765976 sshd[6294]: Accepted publickey for core from 10.200.16.10 port 49104 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:21.766000 audit[6294]: CRED_ACQ pid=6294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:21.766000 audit[6294]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee8c0f680 a2=3 a3=0 items=0 ppid=1 pid=6294 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:21.766000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:21.767495 sshd[6294]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:21.772446 systemd-logind[1422]: New session 18 of user core. May 17 00:40:21.773054 systemd[1]: Started session-18.scope. May 17 00:40:21.777000 audit[6294]: USER_START pid=6294 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:21.779000 audit[6296]: CRED_ACQ pid=6296 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:22.251980 sshd[6294]: pam_unix(sshd:session): session closed for user core May 17 00:40:22.253000 audit[6294]: USER_END pid=6294 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:22.253000 audit[6294]: CRED_DISP pid=6294 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:22.255521 systemd[1]: sshd@15-10.200.4.17:22-10.200.16.10:49104.service: Deactivated successfully. May 17 00:40:22.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.4.17:22-10.200.16.10:49104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:22.256716 systemd[1]: session-18.scope: Deactivated successfully. May 17 00:40:22.257592 systemd-logind[1422]: Session 18 logged out. Waiting for processes to exit. May 17 00:40:22.258612 systemd-logind[1422]: Removed session 18. May 17 00:40:22.993141 kubelet[2441]: E0517 00:40:22.993086 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-b8dc5df5c-7xlwx" podUID="1be837ab-f6c8-4d7d-9976-b853d9b4b123" May 17 00:40:27.029000 audit[5539]: AVC avc: denied { watch } for pid=5539 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_38_19.3485883070/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c573,c770 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c573,c770 tclass=file permissive=0 May 17 00:40:27.033971 kernel: kauditd_printk_skb: 13 callbacks suppressed May 17 00:40:27.034050 kernel: audit: type=1400 audit(1747442427.029:1595): avc: denied { watch } for pid=5539 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_38_19.3485883070/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c573,c770 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c573,c770 tclass=file permissive=0 May 17 00:40:27.029000 audit[5539]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0000c98c0 a2=fc6 a3=0 items=0 ppid=5435 pid=5539 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c573,c770 key=(null) May 17 00:40:27.074622 kernel: audit: type=1300 audit(1747442427.029:1595): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0000c98c0 a2=fc6 a3=0 items=0 ppid=5435 pid=5539 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c573,c770 key=(null) May 17 00:40:27.074751 kernel: audit: type=1327 audit(1747442427.029:1595): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:40:27.029000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:40:27.352553 systemd[1]: Started sshd@16-10.200.4.17:22-10.200.16.10:49116.service. May 17 00:40:27.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.4.17:22-10.200.16.10:49116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:27.369383 kernel: audit: type=1130 audit(1747442427.353:1596): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.4.17:22-10.200.16.10:49116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:27.947000 audit[6307]: USER_ACCT pid=6307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:27.949925 sshd[6307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:27.965613 kernel: audit: type=1101 audit(1747442427.947:1597): pid=6307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:27.965657 sshd[6307]: Accepted publickey for core from 10.200.16.10 port 49116 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:27.949000 audit[6307]: CRED_ACQ pid=6307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:27.970423 systemd[1]: Started session-19.scope. May 17 00:40:27.971774 systemd-logind[1422]: New session 19 of user core. May 17 00:40:27.991016 kernel: audit: type=1103 audit(1747442427.949:1598): pid=6307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:27.991136 kernel: audit: type=1006 audit(1747442427.949:1599): pid=6307 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 May 17 00:40:27.991164 kernel: audit: type=1300 audit(1747442427.949:1599): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe95fc14d0 a2=3 a3=0 items=0 ppid=1 pid=6307 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:27.949000 audit[6307]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe95fc14d0 a2=3 a3=0 items=0 ppid=1 pid=6307 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:28.007073 kernel: audit: type=1327 audit(1747442427.949:1599): proctitle=737368643A20636F7265205B707269765D May 17 00:40:27.949000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:28.012917 kernel: audit: type=1105 audit(1747442427.977:1600): pid=6307 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:27.977000 audit[6307]: USER_START pid=6307 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:27.979000 audit[6309]: CRED_ACQ pid=6309 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:28.432963 sshd[6307]: pam_unix(sshd:session): session closed for user core May 17 00:40:28.434000 audit[6307]: USER_END pid=6307 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:28.434000 audit[6307]: CRED_DISP pid=6307 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:28.436206 systemd[1]: sshd@16-10.200.4.17:22-10.200.16.10:49116.service: Deactivated successfully. May 17 00:40:28.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.4.17:22-10.200.16.10:49116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:28.437197 systemd[1]: session-19.scope: Deactivated successfully. May 17 00:40:28.437918 systemd-logind[1422]: Session 19 logged out. Waiting for processes to exit. May 17 00:40:28.438774 systemd-logind[1422]: Removed session 19. May 17 00:40:28.534597 systemd[1]: Started sshd@17-10.200.4.17:22-10.200.16.10:43604.service. May 17 00:40:28.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.4.17:22-10.200.16.10:43604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:29.132000 audit[6319]: USER_ACCT pid=6319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:29.133555 sshd[6319]: Accepted publickey for core from 10.200.16.10 port 43604 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:29.134000 audit[6319]: CRED_ACQ pid=6319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:29.134000 audit[6319]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff081347f0 a2=3 a3=0 items=0 ppid=1 pid=6319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:29.134000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:29.135416 sshd[6319]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:29.140423 systemd-logind[1422]: New session 20 of user core. May 17 00:40:29.140618 systemd[1]: Started session-20.scope. May 17 00:40:29.145000 audit[6319]: USER_START pid=6319 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:29.146000 audit[6321]: CRED_ACQ pid=6321 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:29.640914 sshd[6319]: pam_unix(sshd:session): session closed for user core May 17 00:40:29.642000 audit[6319]: USER_END pid=6319 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:29.642000 audit[6319]: CRED_DISP pid=6319 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:29.644396 systemd[1]: sshd@17-10.200.4.17:22-10.200.16.10:43604.service: Deactivated successfully. May 17 00:40:29.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.4.17:22-10.200.16.10:43604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:29.645319 systemd[1]: session-20.scope: Deactivated successfully. May 17 00:40:29.645997 systemd-logind[1422]: Session 20 logged out. Waiting for processes to exit. May 17 00:40:29.646756 systemd-logind[1422]: Removed session 20. May 17 00:40:29.742308 systemd[1]: Started sshd@18-10.200.4.17:22-10.200.16.10:43614.service. May 17 00:40:29.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.4.17:22-10.200.16.10:43614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:30.335000 audit[6328]: USER_ACCT pid=6328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:30.336596 sshd[6328]: Accepted publickey for core from 10.200.16.10 port 43614 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:30.336000 audit[6328]: CRED_ACQ pid=6328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:30.336000 audit[6328]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd04aa4610 a2=3 a3=0 items=0 ppid=1 pid=6328 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:30.336000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:30.338069 sshd[6328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:30.343197 systemd[1]: Started session-21.scope. May 17 00:40:30.343442 systemd-logind[1422]: New session 21 of user core. May 17 00:40:30.346000 audit[6328]: USER_START pid=6328 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:30.348000 audit[6330]: CRED_ACQ pid=6330 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:31.488000 audit[6340]: NETFILTER_CFG table=filter:153 family=2 entries=24 op=nft_register_rule pid=6340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:31.488000 audit[6340]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7fff12d565d0 a2=0 a3=7fff12d565bc items=0 ppid=2549 pid=6340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.488000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:31.494000 audit[6340]: NETFILTER_CFG table=nat:154 family=2 entries=22 op=nft_register_rule pid=6340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:31.494000 audit[6340]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff12d565d0 a2=0 a3=0 items=0 ppid=2549 pid=6340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.494000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:31.507000 audit[6342]: NETFILTER_CFG table=filter:155 family=2 entries=36 op=nft_register_rule pid=6342 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:31.507000 audit[6342]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffe88cf0830 a2=0 a3=7ffe88cf081c items=0 ppid=2549 pid=6342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.507000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:31.513000 audit[6342]: NETFILTER_CFG table=nat:156 family=2 entries=22 op=nft_register_rule pid=6342 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:31.513000 audit[6342]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe88cf0830 a2=0 a3=0 items=0 ppid=2549 pid=6342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:31.513000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:31.599934 sshd[6328]: pam_unix(sshd:session): session closed for user core May 17 00:40:31.600000 audit[6328]: USER_END pid=6328 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:31.600000 audit[6328]: CRED_DISP pid=6328 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:31.603144 systemd[1]: sshd@18-10.200.4.17:22-10.200.16.10:43614.service: Deactivated successfully. May 17 00:40:31.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.4.17:22-10.200.16.10:43614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:31.604178 systemd[1]: session-21.scope: Deactivated successfully. May 17 00:40:31.604853 systemd-logind[1422]: Session 21 logged out. Waiting for processes to exit. May 17 00:40:31.605738 systemd-logind[1422]: Removed session 21. May 17 00:40:31.701865 systemd[1]: Started sshd@19-10.200.4.17:22-10.200.16.10:43618.service. May 17 00:40:31.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.4.17:22-10.200.16.10:43618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:32.301916 sshd[6345]: Accepted publickey for core from 10.200.16.10 port 43618 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:32.300000 audit[6345]: USER_ACCT pid=6345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:32.306909 kernel: kauditd_printk_skb: 39 callbacks suppressed May 17 00:40:32.306994 kernel: audit: type=1101 audit(1747442432.300:1628): pid=6345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:32.307777 sshd[6345]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:32.315774 systemd[1]: Started session-22.scope. May 17 00:40:32.317136 systemd-logind[1422]: New session 22 of user core. May 17 00:40:32.326940 kernel: audit: type=1103 audit(1747442432.305:1629): pid=6345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:32.305000 audit[6345]: CRED_ACQ pid=6345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:32.338358 kernel: audit: type=1006 audit(1747442432.305:1630): pid=6345 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 17 00:40:32.347520 kernel: audit: type=1300 audit(1747442432.305:1630): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff03879190 a2=3 a3=0 items=0 ppid=1 pid=6345 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:32.305000 audit[6345]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff03879190 a2=3 a3=0 items=0 ppid=1 pid=6345 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:32.362796 kernel: audit: type=1327 audit(1747442432.305:1630): proctitle=737368643A20636F7265205B707269765D May 17 00:40:32.305000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:32.322000 audit[6345]: USER_START pid=6345 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:32.382750 kernel: audit: type=1105 audit(1747442432.322:1631): pid=6345 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:32.322000 audit[6347]: CRED_ACQ pid=6347 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:32.396519 kernel: audit: type=1103 audit(1747442432.322:1632): pid=6347 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:32.895781 sshd[6345]: pam_unix(sshd:session): session closed for user core May 17 00:40:32.896000 audit[6345]: USER_END pid=6345 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:32.899920 systemd-logind[1422]: Session 22 logged out. Waiting for processes to exit. May 17 00:40:32.901094 systemd[1]: sshd@19-10.200.4.17:22-10.200.16.10:43618.service: Deactivated successfully. May 17 00:40:32.902035 systemd[1]: session-22.scope: Deactivated successfully. May 17 00:40:32.903652 systemd-logind[1422]: Removed session 22. May 17 00:40:32.896000 audit[6345]: CRED_DISP pid=6345 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:32.917229 kernel: audit: type=1106 audit(1747442432.896:1633): pid=6345 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:32.917306 kernel: audit: type=1104 audit(1747442432.896:1634): pid=6345 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:32.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.4.17:22-10.200.16.10:43618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:32.943301 kernel: audit: type=1131 audit(1747442432.896:1635): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.4.17:22-10.200.16.10:43618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:32.994261 kubelet[2441]: E0517 00:40:32.994212 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-zjc4h" podUID="68e18fcd-7ed4-4596-bb1d-407a2a0928fe" May 17 00:40:32.998209 systemd[1]: Started sshd@20-10.200.4.17:22-10.200.16.10:43632.service. May 17 00:40:32.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.4.17:22-10.200.16.10:43632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:33.595165 sshd[6354]: Accepted publickey for core from 10.200.16.10 port 43632 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:33.593000 audit[6354]: USER_ACCT pid=6354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:33.596000 audit[6354]: CRED_ACQ pid=6354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:33.596000 audit[6354]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9fb88040 a2=3 a3=0 items=0 ppid=1 pid=6354 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:33.596000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:33.597996 sshd[6354]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:33.603422 systemd-logind[1422]: New session 23 of user core. May 17 00:40:33.603497 systemd[1]: Started session-23.scope. May 17 00:40:33.607000 audit[6354]: USER_START pid=6354 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:33.608000 audit[6356]: CRED_ACQ pid=6356 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:34.085846 sshd[6354]: pam_unix(sshd:session): session closed for user core May 17 00:40:34.086000 audit[6354]: USER_END pid=6354 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:34.086000 audit[6354]: CRED_DISP pid=6354 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:34.089529 systemd[1]: sshd@20-10.200.4.17:22-10.200.16.10:43632.service: Deactivated successfully. May 17 00:40:34.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.4.17:22-10.200.16.10:43632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:34.090659 systemd[1]: session-23.scope: Deactivated successfully. May 17 00:40:34.091454 systemd-logind[1422]: Session 23 logged out. Waiting for processes to exit. May 17 00:40:34.092328 systemd-logind[1422]: Removed session 23. May 17 00:40:34.994130 kubelet[2441]: E0517 00:40:34.994065 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-b8dc5df5c-7xlwx" podUID="1be837ab-f6c8-4d7d-9976-b853d9b4b123" May 17 00:40:39.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.4.17:22-10.200.16.10:50688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:39.187105 systemd[1]: Started sshd@21-10.200.4.17:22-10.200.16.10:50688.service. May 17 00:40:39.213764 kernel: kauditd_printk_skb: 11 callbacks suppressed May 17 00:40:39.213899 kernel: audit: type=1130 audit(1747442439.186:1645): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.4.17:22-10.200.16.10:50688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:39.224000 audit[6390]: NETFILTER_CFG table=filter:157 family=2 entries=24 op=nft_register_rule pid=6390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:39.235370 kernel: audit: type=1325 audit(1747442439.224:1646): table=filter:157 family=2 entries=24 op=nft_register_rule pid=6390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:39.224000 audit[6390]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffdfd215030 a2=0 a3=7ffdfd21501c items=0 ppid=2549 pid=6390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:39.255403 kernel: audit: type=1300 audit(1747442439.224:1646): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffdfd215030 a2=0 a3=7ffdfd21501c items=0 ppid=2549 pid=6390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:39.224000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:39.267000 audit[6390]: NETFILTER_CFG table=nat:158 family=2 entries=106 op=nft_register_chain pid=6390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:39.286478 kernel: audit: type=1327 audit(1747442439.224:1646): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:39.286568 kernel: audit: type=1325 audit(1747442439.267:1647): table=nat:158 family=2 entries=106 op=nft_register_chain pid=6390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:40:39.286592 kernel: audit: type=1300 audit(1747442439.267:1647): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdfd215030 a2=0 a3=7ffdfd21501c items=0 ppid=2549 pid=6390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:39.267000 audit[6390]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdfd215030 a2=0 a3=7ffdfd21501c items=0 ppid=2549 pid=6390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:39.267000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:39.314076 kernel: audit: type=1327 audit(1747442439.267:1647): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:40:39.807000 audit[6388]: USER_ACCT pid=6388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:39.809732 sshd[6388]: Accepted publickey for core from 10.200.16.10 port 50688 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:39.833374 kernel: audit: type=1101 audit(1747442439.807:1648): pid=6388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:39.832000 audit[6388]: CRED_ACQ pid=6388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:39.840055 sshd[6388]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:39.846263 systemd[1]: Started session-24.scope. May 17 00:40:39.846780 systemd-logind[1422]: New session 24 of user core. May 17 00:40:39.855078 kernel: audit: type=1103 audit(1747442439.832:1649): pid=6388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:39.833000 audit[6388]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc222355d0 a2=3 a3=0 items=0 ppid=1 pid=6388 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:39.833000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:39.852000 audit[6388]: USER_START pid=6388 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:39.853000 audit[6391]: CRED_ACQ pid=6391 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:39.866377 kernel: audit: type=1006 audit(1747442439.833:1650): pid=6388 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 17 00:40:40.300164 sshd[6388]: pam_unix(sshd:session): session closed for user core May 17 00:40:40.300000 audit[6388]: USER_END pid=6388 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:40.300000 audit[6388]: CRED_DISP pid=6388 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:40.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.4.17:22-10.200.16.10:50688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:40.303070 systemd[1]: sshd@21-10.200.4.17:22-10.200.16.10:50688.service: Deactivated successfully. May 17 00:40:40.304323 systemd[1]: session-24.scope: Deactivated successfully. May 17 00:40:40.305076 systemd-logind[1422]: Session 24 logged out. Waiting for processes to exit. May 17 00:40:40.306015 systemd-logind[1422]: Removed session 24. May 17 00:40:41.151884 systemd[1]: run-containerd-runc-k8s.io-16152d2ae5a50bcbce2b59da84611f8e999414e7a82e1a35ef4f131b958df4b5-runc.3ZulFv.mount: Deactivated successfully. May 17 00:40:45.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.4.17:22-10.200.16.10:50692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:45.402406 systemd[1]: Started sshd@22-10.200.4.17:22-10.200.16.10:50692.service. May 17 00:40:45.407012 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:40:45.407090 kernel: audit: type=1130 audit(1747442445.401:1656): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.4.17:22-10.200.16.10:50692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:46.004000 audit[6425]: USER_ACCT pid=6425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:46.006052 sshd[6425]: Accepted publickey for core from 10.200.16.10 port 50692 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:46.020000 audit[6425]: CRED_ACQ pid=6425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:46.022570 sshd[6425]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:46.028035 systemd[1]: Started session-25.scope. May 17 00:40:46.029354 systemd-logind[1422]: New session 25 of user core. May 17 00:40:46.037954 kernel: audit: type=1101 audit(1747442446.004:1657): pid=6425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:46.038034 kernel: audit: type=1103 audit(1747442446.020:1658): pid=6425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:46.020000 audit[6425]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe96906b80 a2=3 a3=0 items=0 ppid=1 pid=6425 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:46.066911 kernel: audit: type=1006 audit(1747442446.020:1659): pid=6425 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 17 00:40:46.066996 kernel: audit: type=1300 audit(1747442446.020:1659): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe96906b80 a2=3 a3=0 items=0 ppid=1 pid=6425 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:46.067032 kernel: audit: type=1327 audit(1747442446.020:1659): proctitle=737368643A20636F7265205B707269765D May 17 00:40:46.020000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:46.033000 audit[6425]: USER_START pid=6425 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:46.042000 audit[6427]: CRED_ACQ pid=6427 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:46.088425 kernel: audit: type=1105 audit(1747442446.033:1660): pid=6425 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:46.088476 kernel: audit: type=1103 audit(1747442446.042:1661): pid=6427 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:46.292749 systemd[1]: run-containerd-runc-k8s.io-16152d2ae5a50bcbce2b59da84611f8e999414e7a82e1a35ef4f131b958df4b5-runc.xGhMXo.mount: Deactivated successfully. May 17 00:40:46.621790 sshd[6425]: pam_unix(sshd:session): session closed for user core May 17 00:40:46.622000 audit[6425]: USER_END pid=6425 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:46.625885 systemd-logind[1422]: Session 25 logged out. Waiting for processes to exit. May 17 00:40:46.627292 systemd[1]: sshd@22-10.200.4.17:22-10.200.16.10:50692.service: Deactivated successfully. May 17 00:40:46.628054 systemd[1]: session-25.scope: Deactivated successfully. May 17 00:40:46.629513 systemd-logind[1422]: Removed session 25. May 17 00:40:46.640398 kernel: audit: type=1106 audit(1747442446.622:1662): pid=6425 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:46.622000 audit[6425]: CRED_DISP pid=6425 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:46.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.4.17:22-10.200.16.10:50692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:46.658381 kernel: audit: type=1104 audit(1747442446.622:1663): pid=6425 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:47.991616 kubelet[2441]: E0517 00:40:47.991566 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-zjc4h" podUID="68e18fcd-7ed4-4596-bb1d-407a2a0928fe" May 17 00:40:48.993136 kubelet[2441]: E0517 00:40:48.993079 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-b8dc5df5c-7xlwx" podUID="1be837ab-f6c8-4d7d-9976-b853d9b4b123" May 17 00:40:51.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.4.17:22-10.200.16.10:56436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:51.721989 systemd[1]: Started sshd@23-10.200.4.17:22-10.200.16.10:56436.service. May 17 00:40:51.726914 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:40:51.726996 kernel: audit: type=1130 audit(1747442451.720:1665): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.4.17:22-10.200.16.10:56436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:52.322000 audit[6458]: USER_ACCT pid=6458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:52.325873 sshd[6458]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:52.341703 kernel: audit: type=1101 audit(1747442452.322:1666): pid=6458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:52.341754 sshd[6458]: Accepted publickey for core from 10.200.16.10 port 56436 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:52.324000 audit[6458]: CRED_ACQ pid=6458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:52.346973 systemd[1]: Started session-26.scope. May 17 00:40:52.348104 systemd-logind[1422]: New session 26 of user core. May 17 00:40:52.358360 kernel: audit: type=1103 audit(1747442452.324:1667): pid=6458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:52.358429 kernel: audit: type=1006 audit(1747442452.324:1668): pid=6458 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 17 00:40:52.324000 audit[6458]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7d2ba4e0 a2=3 a3=0 items=0 ppid=1 pid=6458 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:52.367424 kernel: audit: type=1300 audit(1747442452.324:1668): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7d2ba4e0 a2=3 a3=0 items=0 ppid=1 pid=6458 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:52.324000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:52.381362 kernel: audit: type=1327 audit(1747442452.324:1668): proctitle=737368643A20636F7265205B707269765D May 17 00:40:52.352000 audit[6458]: USER_START pid=6458 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:52.387362 kernel: audit: type=1105 audit(1747442452.352:1669): pid=6458 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:52.354000 audit[6460]: CRED_ACQ pid=6460 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:52.415767 kernel: audit: type=1103 audit(1747442452.354:1670): pid=6460 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:52.803639 sshd[6458]: pam_unix(sshd:session): session closed for user core May 17 00:40:52.804000 audit[6458]: USER_END pid=6458 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:52.809535 systemd[1]: sshd@23-10.200.4.17:22-10.200.16.10:56436.service: Deactivated successfully. May 17 00:40:52.810462 systemd[1]: session-26.scope: Deactivated successfully. May 17 00:40:52.817001 systemd-logind[1422]: Session 26 logged out. Waiting for processes to exit. May 17 00:40:52.817912 systemd-logind[1422]: Removed session 26. May 17 00:40:52.804000 audit[6458]: CRED_DISP pid=6458 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:52.823373 kernel: audit: type=1106 audit(1747442452.804:1671): pid=6458 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:52.823422 kernel: audit: type=1104 audit(1747442452.804:1672): pid=6458 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:52.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.4.17:22-10.200.16.10:56436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:57.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.4.17:22-10.200.16.10:56440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:57.906357 systemd[1]: Started sshd@24-10.200.4.17:22-10.200.16.10:56440.service. May 17 00:40:57.911693 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:40:57.911780 kernel: audit: type=1130 audit(1747442457.905:1674): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.4.17:22-10.200.16.10:56440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:40:58.519000 audit[6472]: USER_ACCT pid=6472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:58.537282 sshd[6472]: Accepted publickey for core from 10.200.16.10 port 56440 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:40:58.537734 kernel: audit: type=1101 audit(1747442458.519:1675): pid=6472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:58.536000 audit[6472]: CRED_ACQ pid=6472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:58.538367 sshd[6472]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:40:58.544445 systemd[1]: Started session-27.scope. May 17 00:40:58.545888 systemd-logind[1422]: New session 27 of user core. May 17 00:40:58.565070 kernel: audit: type=1103 audit(1747442458.536:1676): pid=6472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:58.565187 kernel: audit: type=1006 audit(1747442458.536:1677): pid=6472 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 17 00:40:58.536000 audit[6472]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe97353f30 a2=3 a3=0 items=0 ppid=1 pid=6472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:58.581772 kernel: audit: type=1300 audit(1747442458.536:1677): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe97353f30 a2=3 a3=0 items=0 ppid=1 pid=6472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:40:58.581900 kernel: audit: type=1327 audit(1747442458.536:1677): proctitle=737368643A20636F7265205B707269765D May 17 00:40:58.536000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:40:58.547000 audit[6472]: USER_START pid=6472 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:58.588400 kernel: audit: type=1105 audit(1747442458.547:1678): pid=6472 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:58.552000 audit[6474]: CRED_ACQ pid=6474 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:58.617869 kernel: audit: type=1103 audit(1747442458.552:1679): pid=6474 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:59.009081 sshd[6472]: pam_unix(sshd:session): session closed for user core May 17 00:40:59.009000 audit[6472]: USER_END pid=6472 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:59.014983 systemd-logind[1422]: Session 27 logged out. Waiting for processes to exit. May 17 00:40:59.017862 systemd[1]: sshd@24-10.200.4.17:22-10.200.16.10:56440.service: Deactivated successfully. May 17 00:40:59.018805 systemd[1]: session-27.scope: Deactivated successfully. May 17 00:40:59.020493 systemd-logind[1422]: Removed session 27. May 17 00:40:59.009000 audit[6472]: CRED_DISP pid=6472 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:59.042847 kernel: audit: type=1106 audit(1747442459.009:1680): pid=6472 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:59.042927 kernel: audit: type=1104 audit(1747442459.009:1681): pid=6472 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:40:59.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.4.17:22-10.200.16.10:56440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:00.992859 env[1439]: time="2025-05-17T00:41:00.992539296Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:41:01.190934 env[1439]: time="2025-05-17T00:41:01.190862513Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:41:01.194303 env[1439]: time="2025-05-17T00:41:01.194237847Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:41:01.195037 kubelet[2441]: E0517 00:41:01.194974 2441 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:41:01.195502 kubelet[2441]: E0517 00:41:01.195052 2441 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:41:01.195502 kubelet[2441]: E0517 00:41:01.195219 2441 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:390ed499d1204bf499760421b62bf110,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-fzjs4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-b8dc5df5c-7xlwx_calico-system(1be837ab-f6c8-4d7d-9976-b853d9b4b123): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:41:01.198713 env[1439]: time="2025-05-17T00:41:01.198673592Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:41:01.372953 env[1439]: time="2025-05-17T00:41:01.372873762Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:41:01.376710 env[1439]: time="2025-05-17T00:41:01.376668301Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:41:01.376990 kubelet[2441]: E0517 00:41:01.376940 2441 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:41:01.377094 kubelet[2441]: E0517 00:41:01.377007 2441 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:41:01.377211 kubelet[2441]: E0517 00:41:01.377165 2441 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fzjs4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-b8dc5df5c-7xlwx_calico-system(1be837ab-f6c8-4d7d-9976-b853d9b4b123): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:41:01.378658 kubelet[2441]: E0517 00:41:01.378596 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-b8dc5df5c-7xlwx" podUID="1be837ab-f6c8-4d7d-9976-b853d9b4b123" May 17 00:41:01.990913 kubelet[2441]: E0517 00:41:01.990867 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-zjc4h" podUID="68e18fcd-7ed4-4596-bb1d-407a2a0928fe" May 17 00:41:04.141557 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:41:04.141710 kernel: audit: type=1130 audit(1747442464.129:1683): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.4.17:22-10.200.16.10:44150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:04.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.4.17:22-10.200.16.10:44150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:04.131011 systemd[1]: Started sshd@25-10.200.4.17:22-10.200.16.10:44150.service. May 17 00:41:04.733000 audit[6486]: USER_ACCT pid=6486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:04.734854 sshd[6486]: Accepted publickey for core from 10.200.16.10 port 44150 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:41:04.750000 audit[6486]: CRED_ACQ pid=6486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:04.752499 sshd[6486]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:04.758175 systemd[1]: Started session-28.scope. May 17 00:41:04.759179 systemd-logind[1422]: New session 28 of user core. May 17 00:41:04.767847 kernel: audit: type=1101 audit(1747442464.733:1684): pid=6486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:04.767935 kernel: audit: type=1103 audit(1747442464.750:1685): pid=6486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:04.777218 kernel: audit: type=1006 audit(1747442464.750:1686): pid=6486 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 May 17 00:41:04.750000 audit[6486]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd25f2d210 a2=3 a3=0 items=0 ppid=1 pid=6486 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:04.750000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:41:04.792368 kernel: audit: type=1300 audit(1747442464.750:1686): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd25f2d210 a2=3 a3=0 items=0 ppid=1 pid=6486 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:04.792407 kernel: audit: type=1327 audit(1747442464.750:1686): proctitle=737368643A20636F7265205B707269765D May 17 00:41:04.797917 kernel: audit: type=1105 audit(1747442464.763:1687): pid=6486 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:04.763000 audit[6486]: USER_START pid=6486 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:04.765000 audit[6488]: CRED_ACQ pid=6488 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:04.826636 kernel: audit: type=1103 audit(1747442464.765:1688): pid=6488 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:04.881853 systemd[1]: run-containerd-runc-k8s.io-e357c28ad19aa8f717feec3fbae98d960c7a6b9ea3bd9d202b02e0f1443e0b0b-runc.XpdyBk.mount: Deactivated successfully. May 17 00:41:05.231754 sshd[6486]: pam_unix(sshd:session): session closed for user core May 17 00:41:05.231000 audit[6486]: USER_END pid=6486 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:05.235244 systemd[1]: sshd@25-10.200.4.17:22-10.200.16.10:44150.service: Deactivated successfully. May 17 00:41:05.236105 systemd[1]: session-28.scope: Deactivated successfully. May 17 00:41:05.237707 systemd-logind[1422]: Session 28 logged out. Waiting for processes to exit. May 17 00:41:05.238696 systemd-logind[1422]: Removed session 28. May 17 00:41:05.232000 audit[6486]: CRED_DISP pid=6486 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:05.250371 kernel: audit: type=1106 audit(1747442465.231:1689): pid=6486 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:05.250419 kernel: audit: type=1104 audit(1747442465.232:1690): pid=6486 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:05.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.4.17:22-10.200.16.10:44150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:10.353441 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:41:10.358119 kernel: audit: type=1130 audit(1747442470.331:1692): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.4.17:22-10.200.16.10:58216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:10.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.4.17:22-10.200.16.10:58216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:10.332832 systemd[1]: Started sshd@26-10.200.4.17:22-10.200.16.10:58216.service. May 17 00:41:10.951000 audit[6527]: USER_ACCT pid=6527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:10.970198 sshd[6527]: Accepted publickey for core from 10.200.16.10 port 58216 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:41:10.970571 kernel: audit: type=1101 audit(1747442470.951:1693): pid=6527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:10.970662 sshd[6527]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:41:10.969000 audit[6527]: CRED_ACQ pid=6527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:10.976670 systemd-logind[1422]: New session 29 of user core. May 17 00:41:10.977406 systemd[1]: Started session-29.scope. May 17 00:41:10.995361 kernel: audit: type=1103 audit(1747442470.969:1694): pid=6527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:10.995459 kernel: audit: type=1006 audit(1747442470.969:1695): pid=6527 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 May 17 00:41:10.995488 kernel: audit: type=1300 audit(1747442470.969:1695): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc87bc2850 a2=3 a3=0 items=0 ppid=1 pid=6527 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.969000 audit[6527]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc87bc2850 a2=3 a3=0 items=0 ppid=1 pid=6527 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:41:10.969000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:41:11.015436 kernel: audit: type=1327 audit(1747442470.969:1695): proctitle=737368643A20636F7265205B707269765D May 17 00:41:11.015512 kernel: audit: type=1105 audit(1747442470.981:1696): pid=6527 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:10.981000 audit[6527]: USER_START pid=6527 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:10.983000 audit[6529]: CRED_ACQ pid=6529 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:11.032370 kernel: audit: type=1103 audit(1747442470.983:1697): pid=6529 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:11.448991 sshd[6527]: pam_unix(sshd:session): session closed for user core May 17 00:41:11.449000 audit[6527]: USER_END pid=6527 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:11.452770 systemd[1]: sshd@26-10.200.4.17:22-10.200.16.10:58216.service: Deactivated successfully. May 17 00:41:11.453782 systemd[1]: session-29.scope: Deactivated successfully. May 17 00:41:11.455804 systemd-logind[1422]: Session 29 logged out. Waiting for processes to exit. May 17 00:41:11.456949 systemd-logind[1422]: Removed session 29. May 17 00:41:11.449000 audit[6527]: CRED_DISP pid=6527 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:11.481726 kernel: audit: type=1106 audit(1747442471.449:1698): pid=6527 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:11.481815 kernel: audit: type=1104 audit(1747442471.449:1699): pid=6527 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:41:11.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.4.17:22-10.200.16.10:58216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:41:12.412000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:12.412000 audit[2257]: AVC avc: denied { watch } for pid=2257 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:12.412000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0029228d0 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:41:12.412000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:41:12.412000 audit[2257]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013a5000 a2=fc6 a3=0 items=0 ppid=2138 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c509 key=(null) May 17 00:41:12.412000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:41:12.909000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7373 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:12.909000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:12.909000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0106f3860 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:41:12.909000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:41:12.909000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c000b85410 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:41:12.909000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:41:12.981000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:12.981000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00a612860 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:41:12.981000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:41:12.991000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:12.991000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00a6128c0 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:41:12.991000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:41:12.991000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7379 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:12.991000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0106f3c20 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:41:12.991000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:41:12.993588 kubelet[2441]: E0517 00:41:12.992823 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-b8dc5df5c-7xlwx" podUID="1be837ab-f6c8-4d7d-9976-b853d9b4b123" May 17 00:41:12.994017 env[1439]: time="2025-05-17T00:41:12.992841809Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:41:12.994000 audit[2315]: AVC avc: denied { watch } for pid=2315 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:41:12.994000 audit[2315]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00ab405d0 a2=fc6 a3=0 items=0 ppid=2118 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c315,c397 key=(null) May 17 00:41:12.994000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:41:13.172444 env[1439]: time="2025-05-17T00:41:13.172294508Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:41:13.176088 env[1439]: time="2025-05-17T00:41:13.176027741Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:41:13.176352 kubelet[2441]: E0517 00:41:13.176296 2441 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:41:13.176469 kubelet[2441]: E0517 00:41:13.176367 2441 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:41:13.176587 kubelet[2441]: E0517 00:41:13.176538 2441 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-8r4bq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-zjc4h_calico-system(68e18fcd-7ed4-4596-bb1d-407a2a0928fe): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:41:13.177926 kubelet[2441]: E0517 00:41:13.177887 2441 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-zjc4h" podUID="68e18fcd-7ed4-4596-bb1d-407a2a0928fe"