May 17 00:33:32.030003 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:33:32.030026 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:33:32.030035 kernel: BIOS-provided physical RAM map: May 17 00:33:32.030041 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 17 00:33:32.030049 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved May 17 00:33:32.030054 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable May 17 00:33:32.030063 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved May 17 00:33:32.030072 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data May 17 00:33:32.030078 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS May 17 00:33:32.030083 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable May 17 00:33:32.030090 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable May 17 00:33:32.030097 kernel: printk: bootconsole [earlyser0] enabled May 17 00:33:32.030103 kernel: NX (Execute Disable) protection: active May 17 00:33:32.030110 kernel: efi: EFI v2.70 by Microsoft May 17 00:33:32.030121 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c4a98 RNG=0x3ffd1018 May 17 00:33:32.030127 kernel: random: crng init done May 17 00:33:32.030136 kernel: SMBIOS 3.1.0 present. May 17 00:33:32.030143 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 May 17 00:33:32.030149 kernel: Hypervisor detected: Microsoft Hyper-V May 17 00:33:32.030158 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 May 17 00:33:32.030165 kernel: Hyper-V Host Build:20348-10.0-1-0.1827 May 17 00:33:32.030171 kernel: Hyper-V: Nested features: 0x1e0101 May 17 00:33:32.030181 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 May 17 00:33:32.030187 kernel: Hyper-V: Using hypercall for remote TLB flush May 17 00:33:32.030193 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns May 17 00:33:32.030200 kernel: tsc: Marking TSC unstable due to running on Hyper-V May 17 00:33:32.030209 kernel: tsc: Detected 2593.906 MHz processor May 17 00:33:32.030216 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:33:32.030225 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:33:32.030232 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 May 17 00:33:32.030241 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:33:32.030249 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved May 17 00:33:32.030259 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 May 17 00:33:32.030267 kernel: Using GB pages for direct mapping May 17 00:33:32.030274 kernel: Secure boot disabled May 17 00:33:32.030282 kernel: ACPI: Early table checksum verification disabled May 17 00:33:32.030289 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) May 17 00:33:32.030296 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:33:32.030304 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:33:32.030311 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) May 17 00:33:32.030325 kernel: ACPI: FACS 0x000000003FFFE000 000040 May 17 00:33:32.030332 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:33:32.030341 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:33:32.030349 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:33:32.030355 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:33:32.030366 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:33:32.030374 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:33:32.030381 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 17 00:33:32.030388 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] May 17 00:33:32.030397 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] May 17 00:33:32.030404 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] May 17 00:33:32.030411 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] May 17 00:33:32.030421 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] May 17 00:33:32.030427 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] May 17 00:33:32.030437 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] May 17 00:33:32.030445 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] May 17 00:33:32.030454 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] May 17 00:33:32.030462 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] May 17 00:33:32.030470 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 17 00:33:32.030477 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 17 00:33:32.030484 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug May 17 00:33:32.030491 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug May 17 00:33:32.030500 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug May 17 00:33:32.030509 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug May 17 00:33:32.030517 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug May 17 00:33:32.030525 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug May 17 00:33:32.030532 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug May 17 00:33:32.030542 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug May 17 00:33:32.030549 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug May 17 00:33:32.030556 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug May 17 00:33:32.030565 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug May 17 00:33:32.030572 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug May 17 00:33:32.030580 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug May 17 00:33:32.030587 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug May 17 00:33:32.030597 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug May 17 00:33:32.030604 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug May 17 00:33:32.030611 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] May 17 00:33:32.030620 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] May 17 00:33:32.030627 kernel: Zone ranges: May 17 00:33:32.030636 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:33:32.030644 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 17 00:33:32.030655 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] May 17 00:33:32.030663 kernel: Movable zone start for each node May 17 00:33:32.030672 kernel: Early memory node ranges May 17 00:33:32.030680 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 17 00:33:32.030688 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] May 17 00:33:32.030697 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] May 17 00:33:32.030704 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] May 17 00:33:32.030713 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] May 17 00:33:32.030720 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:33:32.030731 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 17 00:33:32.030739 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges May 17 00:33:32.030745 kernel: ACPI: PM-Timer IO Port: 0x408 May 17 00:33:32.030755 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) May 17 00:33:32.030762 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 May 17 00:33:32.030769 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 17 00:33:32.030778 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:33:32.030787 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 May 17 00:33:32.030795 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 17 00:33:32.042047 kernel: [mem 0x40000000-0xffffffff] available for PCI devices May 17 00:33:32.042061 kernel: Booting paravirtualized kernel on Hyper-V May 17 00:33:32.042072 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:33:32.042084 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 17 00:33:32.042095 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 17 00:33:32.042105 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 17 00:33:32.042116 kernel: pcpu-alloc: [0] 0 1 May 17 00:33:32.042127 kernel: Hyper-V: PV spinlocks enabled May 17 00:33:32.042139 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 17 00:33:32.042155 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 May 17 00:33:32.042167 kernel: Policy zone: Normal May 17 00:33:32.042182 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:33:32.042194 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:33:32.042205 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) May 17 00:33:32.042215 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 17 00:33:32.042227 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:33:32.042240 kernel: Memory: 8079144K/8387460K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 308056K reserved, 0K cma-reserved) May 17 00:33:32.042255 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 00:33:32.042266 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:33:32.042287 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:33:32.042301 kernel: rcu: Hierarchical RCU implementation. May 17 00:33:32.042312 kernel: rcu: RCU event tracing is enabled. May 17 00:33:32.042323 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 00:33:32.042331 kernel: Rude variant of Tasks RCU enabled. May 17 00:33:32.042342 kernel: Tracing variant of Tasks RCU enabled. May 17 00:33:32.042352 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:33:32.042360 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 00:33:32.042371 kernel: Using NULL legacy PIC May 17 00:33:32.042381 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 May 17 00:33:32.042391 kernel: Console: colour dummy device 80x25 May 17 00:33:32.042399 kernel: printk: console [tty1] enabled May 17 00:33:32.042409 kernel: printk: console [ttyS0] enabled May 17 00:33:32.042417 kernel: printk: bootconsole [earlyser0] disabled May 17 00:33:32.042428 kernel: ACPI: Core revision 20210730 May 17 00:33:32.042438 kernel: Failed to register legacy timer interrupt May 17 00:33:32.042446 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:33:32.042454 kernel: Hyper-V: Using IPI hypercalls May 17 00:33:32.042463 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593906) May 17 00:33:32.042470 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 17 00:33:32.042478 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 17 00:33:32.042485 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:33:32.042492 kernel: Spectre V2 : Mitigation: Retpolines May 17 00:33:32.042502 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 17 00:33:32.042512 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! May 17 00:33:32.042519 kernel: RETBleed: Vulnerable May 17 00:33:32.042526 kernel: Speculative Store Bypass: Vulnerable May 17 00:33:32.042535 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:33:32.042545 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:33:32.042552 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:33:32.042559 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:33:32.042566 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:33:32.042576 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' May 17 00:33:32.042584 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' May 17 00:33:32.042593 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' May 17 00:33:32.042602 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:33:32.042610 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 May 17 00:33:32.042617 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 May 17 00:33:32.042626 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 May 17 00:33:32.042635 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. May 17 00:33:32.042642 kernel: Freeing SMP alternatives memory: 32K May 17 00:33:32.042650 kernel: pid_max: default: 32768 minimum: 301 May 17 00:33:32.042659 kernel: LSM: Security Framework initializing May 17 00:33:32.042669 kernel: SELinux: Initializing. May 17 00:33:32.042676 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:33:32.042685 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:33:32.042696 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) May 17 00:33:32.042706 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. May 17 00:33:32.042713 kernel: signal: max sigframe size: 3632 May 17 00:33:32.042723 kernel: rcu: Hierarchical SRCU implementation. May 17 00:33:32.042731 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 17 00:33:32.042741 kernel: smp: Bringing up secondary CPUs ... May 17 00:33:32.042748 kernel: x86: Booting SMP configuration: May 17 00:33:32.042755 kernel: .... node #0, CPUs: #1 May 17 00:33:32.042763 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. May 17 00:33:32.042773 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 17 00:33:32.042780 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:33:32.042788 kernel: smpboot: Max logical packages: 1 May 17 00:33:32.042795 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) May 17 00:33:32.042814 kernel: devtmpfs: initialized May 17 00:33:32.042821 kernel: x86/mm: Memory block size: 128MB May 17 00:33:32.042829 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) May 17 00:33:32.042839 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:33:32.042846 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 00:33:32.042859 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:33:32.042866 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:33:32.042878 kernel: audit: initializing netlink subsys (disabled) May 17 00:33:32.042885 kernel: audit: type=2000 audit(1747442010.023:1): state=initialized audit_enabled=0 res=1 May 17 00:33:32.042896 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:33:32.042904 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:33:32.042913 kernel: cpuidle: using governor menu May 17 00:33:32.042920 kernel: ACPI: bus type PCI registered May 17 00:33:32.042931 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:33:32.042943 kernel: dca service started, version 1.12.1 May 17 00:33:32.042951 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:33:32.042959 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:33:32.042968 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:33:32.042978 kernel: ACPI: Added _OSI(Module Device) May 17 00:33:32.042986 kernel: ACPI: Added _OSI(Processor Device) May 17 00:33:32.042996 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:33:32.043005 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:33:32.043015 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:33:32.043024 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:33:32.043034 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:33:32.043043 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 17 00:33:32.043051 kernel: ACPI: Interpreter enabled May 17 00:33:32.043059 kernel: ACPI: PM: (supports S0 S5) May 17 00:33:32.043070 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:33:32.043079 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:33:32.043088 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F May 17 00:33:32.043095 kernel: iommu: Default domain type: Translated May 17 00:33:32.043107 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:33:32.043117 kernel: vgaarb: loaded May 17 00:33:32.043125 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:33:32.043134 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:33:32.043142 kernel: PTP clock support registered May 17 00:33:32.043149 kernel: Registered efivars operations May 17 00:33:32.043157 kernel: PCI: Using ACPI for IRQ routing May 17 00:33:32.043167 kernel: PCI: System does not support PCI May 17 00:33:32.043175 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page May 17 00:33:32.043184 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:33:32.043192 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:33:32.043202 kernel: pnp: PnP ACPI init May 17 00:33:32.043210 kernel: pnp: PnP ACPI: found 3 devices May 17 00:33:32.043220 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:33:32.043227 kernel: NET: Registered PF_INET protocol family May 17 00:33:32.043235 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 17 00:33:32.043244 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) May 17 00:33:32.043253 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:33:32.043265 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) May 17 00:33:32.043272 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) May 17 00:33:32.043281 kernel: TCP: Hash tables configured (established 65536 bind 65536) May 17 00:33:32.043290 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) May 17 00:33:32.043301 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) May 17 00:33:32.043308 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:33:32.043316 kernel: NET: Registered PF_XDP protocol family May 17 00:33:32.043325 kernel: PCI: CLS 0 bytes, default 64 May 17 00:33:32.043335 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 17 00:33:32.043345 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) May 17 00:33:32.043355 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 17 00:33:32.043363 kernel: Initialise system trusted keyrings May 17 00:33:32.043373 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 May 17 00:33:32.043380 kernel: Key type asymmetric registered May 17 00:33:32.043390 kernel: Asymmetric key parser 'x509' registered May 17 00:33:32.043399 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:33:32.043408 kernel: io scheduler mq-deadline registered May 17 00:33:32.043415 kernel: io scheduler kyber registered May 17 00:33:32.043427 kernel: io scheduler bfq registered May 17 00:33:32.043438 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:33:32.043445 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:33:32.043454 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:33:32.043463 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A May 17 00:33:32.043473 kernel: i8042: PNP: No PS/2 controller found. May 17 00:33:32.043614 kernel: rtc_cmos 00:02: registered as rtc0 May 17 00:33:32.043700 kernel: rtc_cmos 00:02: setting system clock to 2025-05-17T00:33:31 UTC (1747442011) May 17 00:33:32.043783 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram May 17 00:33:32.043796 kernel: intel_pstate: CPU model not supported May 17 00:33:32.043814 kernel: efifb: probing for efifb May 17 00:33:32.043821 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k May 17 00:33:32.043832 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 May 17 00:33:32.043841 kernel: efifb: scrolling: redraw May 17 00:33:32.043850 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 17 00:33:32.043859 kernel: Console: switching to colour frame buffer device 128x48 May 17 00:33:32.043871 kernel: fb0: EFI VGA frame buffer device May 17 00:33:32.043880 kernel: pstore: Registered efi as persistent store backend May 17 00:33:32.043888 kernel: NET: Registered PF_INET6 protocol family May 17 00:33:32.043898 kernel: Segment Routing with IPv6 May 17 00:33:32.043906 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:33:32.043915 kernel: NET: Registered PF_PACKET protocol family May 17 00:33:32.043923 kernel: Key type dns_resolver registered May 17 00:33:32.043933 kernel: IPI shorthand broadcast: enabled May 17 00:33:32.043943 kernel: sched_clock: Marking stable (726738100, 21181500)->(941649300, -193729700) May 17 00:33:32.043951 kernel: registered taskstats version 1 May 17 00:33:32.043963 kernel: Loading compiled-in X.509 certificates May 17 00:33:32.043971 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:33:32.043982 kernel: Key type .fscrypt registered May 17 00:33:32.043989 kernel: Key type fscrypt-provisioning registered May 17 00:33:32.043999 kernel: pstore: Using crash dump compression: deflate May 17 00:33:32.044008 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:33:32.044018 kernel: ima: Allocated hash algorithm: sha1 May 17 00:33:32.044025 kernel: ima: No architecture policies found May 17 00:33:32.044037 kernel: clk: Disabling unused clocks May 17 00:33:32.044048 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:33:32.044055 kernel: Write protecting the kernel read-only data: 28672k May 17 00:33:32.044064 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:33:32.044073 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:33:32.044083 kernel: Run /init as init process May 17 00:33:32.044090 kernel: with arguments: May 17 00:33:32.044101 kernel: /init May 17 00:33:32.044109 kernel: with environment: May 17 00:33:32.044120 kernel: HOME=/ May 17 00:33:32.044127 kernel: TERM=linux May 17 00:33:32.044137 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:33:32.044149 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:33:32.044159 systemd[1]: Detected virtualization microsoft. May 17 00:33:32.044170 systemd[1]: Detected architecture x86-64. May 17 00:33:32.044179 systemd[1]: Running in initrd. May 17 00:33:32.044187 systemd[1]: No hostname configured, using default hostname. May 17 00:33:32.044199 systemd[1]: Hostname set to . May 17 00:33:32.044208 systemd[1]: Initializing machine ID from random generator. May 17 00:33:32.044219 systemd[1]: Queued start job for default target initrd.target. May 17 00:33:32.044227 systemd[1]: Started systemd-ask-password-console.path. May 17 00:33:32.044237 systemd[1]: Reached target cryptsetup.target. May 17 00:33:32.044247 systemd[1]: Reached target paths.target. May 17 00:33:32.044255 systemd[1]: Reached target slices.target. May 17 00:33:32.044263 systemd[1]: Reached target swap.target. May 17 00:33:32.044275 systemd[1]: Reached target timers.target. May 17 00:33:32.044286 systemd[1]: Listening on iscsid.socket. May 17 00:33:32.044294 systemd[1]: Listening on iscsiuio.socket. May 17 00:33:32.044305 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:33:32.044314 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:33:32.044323 systemd[1]: Listening on systemd-journald.socket. May 17 00:33:32.044331 systemd[1]: Listening on systemd-networkd.socket. May 17 00:33:32.044342 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:33:32.044354 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:33:32.044362 systemd[1]: Reached target sockets.target. May 17 00:33:32.044371 systemd[1]: Starting kmod-static-nodes.service... May 17 00:33:32.044381 systemd[1]: Finished network-cleanup.service. May 17 00:33:32.044394 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:33:32.044402 systemd[1]: Starting systemd-journald.service... May 17 00:33:32.044412 systemd[1]: Starting systemd-modules-load.service... May 17 00:33:32.044421 systemd[1]: Starting systemd-resolved.service... May 17 00:33:32.044431 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:33:32.044441 systemd[1]: Finished kmod-static-nodes.service. May 17 00:33:32.044452 kernel: audit: type=1130 audit(1747442012.030:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:32.044462 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:33:32.044475 systemd-journald[183]: Journal started May 17 00:33:32.044527 systemd-journald[183]: Runtime Journal (/run/log/journal/53615374664b47a8b9776cd4c6e250f9) is 8.0M, max 159.0M, 151.0M free. May 17 00:33:32.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:32.016835 systemd-modules-load[184]: Inserted module 'overlay' May 17 00:33:32.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:32.073431 systemd[1]: Started systemd-journald.service. May 17 00:33:32.073466 kernel: audit: type=1130 audit(1747442012.052:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:32.076265 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:33:32.102195 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:33:32.102229 kernel: audit: type=1130 audit(1747442012.075:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:32.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:32.091287 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:33:32.107168 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:33:32.121500 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:33:32.129818 kernel: Bridge firewalling registered May 17 00:33:32.129830 systemd-resolved[185]: Positive Trust Anchors: May 17 00:33:32.129843 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:33:32.129889 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:33:32.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:32.157297 kernel: audit: type=1130 audit(1747442012.078:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:32.157353 systemd-modules-load[184]: Inserted module 'br_netfilter' May 17 00:33:32.163043 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:33:32.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:32.177861 kernel: audit: type=1130 audit(1747442012.120:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:32.178689 systemd-resolved[185]: Defaulting to hostname 'linux'. May 17 00:33:32.179443 systemd[1]: Starting dracut-cmdline.service... May 17 00:33:32.186983 systemd[1]: Started systemd-resolved.service. May 17 00:33:32.189346 systemd[1]: Reached target nss-lookup.target. May 17 00:33:32.199055 dracut-cmdline[200]: dracut-dracut-053 May 17 00:33:32.203064 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:33:32.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:32.250447 kernel: audit: type=1130 audit(1747442012.177:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:32.250492 kernel: audit: type=1130 audit(1747442012.188:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:32.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:32.254814 kernel: SCSI subsystem initialized May 17 00:33:32.279426 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:33:32.279469 kernel: device-mapper: uevent: version 1.0.3 May 17 00:33:32.285552 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:33:32.289483 systemd-modules-load[184]: Inserted module 'dm_multipath' May 17 00:33:32.292386 systemd[1]: Finished systemd-modules-load.service. May 17 00:33:32.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:32.297416 systemd[1]: Starting systemd-sysctl.service... May 17 00:33:32.317934 kernel: audit: type=1130 audit(1747442012.296:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:32.317961 kernel: Loading iSCSI transport class v2.0-870. May 17 00:33:32.324735 systemd[1]: Finished systemd-sysctl.service. May 17 00:33:32.341002 kernel: audit: type=1130 audit(1747442012.326:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:32.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:32.353825 kernel: iscsi: registered transport (tcp) May 17 00:33:32.379730 kernel: iscsi: registered transport (qla4xxx) May 17 00:33:32.379793 kernel: QLogic iSCSI HBA Driver May 17 00:33:32.408481 systemd[1]: Finished dracut-cmdline.service. May 17 00:33:32.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:32.411873 systemd[1]: Starting dracut-pre-udev.service... May 17 00:33:32.462823 kernel: raid6: avx512x4 gen() 18609 MB/s May 17 00:33:32.482814 kernel: raid6: avx512x4 xor() 8329 MB/s May 17 00:33:32.501811 kernel: raid6: avx512x2 gen() 18574 MB/s May 17 00:33:32.521817 kernel: raid6: avx512x2 xor() 29813 MB/s May 17 00:33:32.540811 kernel: raid6: avx512x1 gen() 18607 MB/s May 17 00:33:32.559811 kernel: raid6: avx512x1 xor() 26955 MB/s May 17 00:33:32.579814 kernel: raid6: avx2x4 gen() 18522 MB/s May 17 00:33:32.601812 kernel: raid6: avx2x4 xor() 7849 MB/s May 17 00:33:32.620816 kernel: raid6: avx2x2 gen() 18512 MB/s May 17 00:33:32.640814 kernel: raid6: avx2x2 xor() 22387 MB/s May 17 00:33:32.659809 kernel: raid6: avx2x1 gen() 14258 MB/s May 17 00:33:32.679811 kernel: raid6: avx2x1 xor() 19518 MB/s May 17 00:33:32.699813 kernel: raid6: sse2x4 gen() 11748 MB/s May 17 00:33:32.718811 kernel: raid6: sse2x4 xor() 7448 MB/s May 17 00:33:32.737811 kernel: raid6: sse2x2 gen() 12956 MB/s May 17 00:33:32.757814 kernel: raid6: sse2x2 xor() 7710 MB/s May 17 00:33:32.776811 kernel: raid6: sse2x1 gen() 11749 MB/s May 17 00:33:32.799688 kernel: raid6: sse2x1 xor() 5967 MB/s May 17 00:33:32.799714 kernel: raid6: using algorithm avx512x4 gen() 18609 MB/s May 17 00:33:32.799725 kernel: raid6: .... xor() 8329 MB/s, rmw enabled May 17 00:33:32.802929 kernel: raid6: using avx512x2 recovery algorithm May 17 00:33:32.821821 kernel: xor: automatically using best checksumming function avx May 17 00:33:32.916824 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:33:32.924808 systemd[1]: Finished dracut-pre-udev.service. May 17 00:33:32.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:32.926000 audit: BPF prog-id=7 op=LOAD May 17 00:33:32.926000 audit: BPF prog-id=8 op=LOAD May 17 00:33:32.927622 systemd[1]: Starting systemd-udevd.service... May 17 00:33:32.945411 systemd-udevd[383]: Using default interface naming scheme 'v252'. May 17 00:33:32.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:32.952015 systemd[1]: Started systemd-udevd.service. May 17 00:33:32.954991 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:33:32.974712 dracut-pre-trigger[395]: rd.md=0: removing MD RAID activation May 17 00:33:33.005397 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:33:33.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:33.008401 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:33:33.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:33.045078 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:33:33.096969 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:33:33.109817 kernel: hv_vmbus: Vmbus version:5.2 May 17 00:33:33.117818 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:33:33.117871 kernel: AES CTR mode by8 optimization enabled May 17 00:33:33.133815 kernel: hv_vmbus: registering driver hyperv_keyboard May 17 00:33:33.149814 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 May 17 00:33:33.170818 kernel: hid: raw HID events driver (C) Jiri Kosina May 17 00:33:33.170871 kernel: hv_vmbus: registering driver hv_storvsc May 17 00:33:33.178980 kernel: scsi host0: storvsc_host_t May 17 00:33:33.179038 kernel: scsi host1: storvsc_host_t May 17 00:33:33.186009 kernel: scsi 1:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 May 17 00:33:33.192827 kernel: scsi 1:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 May 17 00:33:33.192872 kernel: hv_vmbus: registering driver hv_netvsc May 17 00:33:33.207822 kernel: hv_vmbus: registering driver hid_hyperv May 17 00:33:33.219752 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 May 17 00:33:33.219808 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on May 17 00:33:33.242055 kernel: sr 1:0:0:2: [sr0] scsi-1 drive May 17 00:33:33.253486 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 17 00:33:33.253507 kernel: sd 1:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) May 17 00:33:33.269923 kernel: sd 1:0:0:0: [sda] 4096-byte physical blocks May 17 00:33:33.270101 kernel: sd 1:0:0:0: [sda] Write Protect is off May 17 00:33:33.270272 kernel: sr 1:0:0:2: Attached scsi CD-ROM sr0 May 17 00:33:33.270431 kernel: sd 1:0:0:0: [sda] Mode Sense: 0f 00 10 00 May 17 00:33:33.270590 kernel: sd 1:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA May 17 00:33:33.270757 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:33:33.270775 kernel: sd 1:0:0:0: [sda] Attached SCSI disk May 17 00:33:33.404396 kernel: hv_netvsc 7c1e5202-d73c-7c1e-5202-d73c7c1e5202 eth0: VF slot 1 added May 17 00:33:33.418972 kernel: hv_vmbus: registering driver hv_pci May 17 00:33:33.419017 kernel: hv_pci 887eda09-ec67-4083-883f-628ca60a0f13: PCI VMBus probing: Using version 0x10004 May 17 00:33:33.525210 kernel: hv_pci 887eda09-ec67-4083-883f-628ca60a0f13: PCI host bridge to bus ec67:00 May 17 00:33:33.525395 kernel: pci_bus ec67:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] May 17 00:33:33.525567 kernel: pci_bus ec67:00: No busn resource found for root bus, will use [bus 00-ff] May 17 00:33:33.525713 kernel: pci ec67:00:02.0: [15b3:1016] type 00 class 0x020000 May 17 00:33:33.525912 kernel: pci ec67:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] May 17 00:33:33.526074 kernel: pci ec67:00:02.0: enabling Extended Tags May 17 00:33:33.526232 kernel: pci ec67:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at ec67:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) May 17 00:33:33.526389 kernel: pci_bus ec67:00: busn_res: [bus 00-ff] end is updated to 00 May 17 00:33:33.526534 kernel: pci ec67:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] May 17 00:33:33.616817 kernel: mlx5_core ec67:00:02.0: firmware version: 14.30.5000 May 17 00:33:33.889004 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (433) May 17 00:33:33.889031 kernel: mlx5_core ec67:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) May 17 00:33:33.889206 kernel: mlx5_core ec67:00:02.0: Supported tc offload range - chains: 1, prios: 1 May 17 00:33:33.889356 kernel: mlx5_core ec67:00:02.0: mlx5e_tc_post_act_init:40:(pid 188): firmware level support is missing May 17 00:33:33.889511 kernel: hv_netvsc 7c1e5202-d73c-7c1e-5202-d73c7c1e5202 eth0: VF registering: eth1 May 17 00:33:33.889660 kernel: mlx5_core ec67:00:02.0 eth1: joined to eth0 May 17 00:33:33.778655 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:33:33.786726 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:33:33.897989 kernel: mlx5_core ec67:00:02.0 enP60519s1: renamed from eth1 May 17 00:33:33.956239 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:33:33.961565 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:33:33.968496 systemd[1]: Starting disk-uuid.service... May 17 00:33:33.997639 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:33:34.997618 disk-uuid[558]: The operation has completed successfully. May 17 00:33:35.000855 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 17 00:33:35.064549 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:33:35.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:35.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:35.064656 systemd[1]: Finished disk-uuid.service. May 17 00:33:35.079590 systemd[1]: Starting verity-setup.service... May 17 00:33:35.116832 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 17 00:33:35.441535 systemd[1]: Found device dev-mapper-usr.device. May 17 00:33:35.446611 systemd[1]: Mounting sysusr-usr.mount... May 17 00:33:35.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:35.448645 systemd[1]: Finished verity-setup.service. May 17 00:33:35.522836 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:33:35.523027 systemd[1]: Mounted sysusr-usr.mount. May 17 00:33:35.526559 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:33:35.530575 systemd[1]: Starting ignition-setup.service... May 17 00:33:35.534905 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:33:35.558123 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:33:35.558166 kernel: BTRFS info (device sda6): using free space tree May 17 00:33:35.558184 kernel: BTRFS info (device sda6): has skinny extents May 17 00:33:35.601499 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:33:35.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:35.605000 audit: BPF prog-id=9 op=LOAD May 17 00:33:35.606953 systemd[1]: Starting systemd-networkd.service... May 17 00:33:35.630378 systemd-networkd[828]: lo: Link UP May 17 00:33:35.630386 systemd-networkd[828]: lo: Gained carrier May 17 00:33:35.631493 systemd-networkd[828]: Enumeration completed May 17 00:33:35.636540 systemd[1]: Started systemd-networkd.service. May 17 00:33:35.636910 systemd-networkd[828]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:33:35.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:35.643426 systemd[1]: Reached target network.target. May 17 00:33:35.647540 systemd[1]: Starting iscsiuio.service... May 17 00:33:35.656268 systemd[1]: Started iscsiuio.service. May 17 00:33:35.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:35.658205 systemd[1]: Starting iscsid.service... May 17 00:33:35.666042 iscsid[836]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:33:35.666042 iscsid[836]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:33:35.666042 iscsid[836]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:33:35.666042 iscsid[836]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:33:35.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:35.696825 iscsid[836]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:33:35.696825 iscsid[836]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:33:35.667529 systemd[1]: Started iscsid.service. May 17 00:33:35.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:35.673024 systemd[1]: Starting dracut-initqueue.service... May 17 00:33:35.698002 systemd[1]: Finished dracut-initqueue.service. May 17 00:33:35.711236 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:33:35.713472 systemd[1]: Reached target remote-fs-pre.target. May 17 00:33:35.721861 kernel: mlx5_core ec67:00:02.0 enP60519s1: Link up May 17 00:33:35.716142 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:33:35.726034 systemd[1]: Reached target remote-fs.target. May 17 00:33:35.730890 systemd[1]: Starting dracut-pre-mount.service... May 17 00:33:35.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:35.739003 systemd[1]: Finished dracut-pre-mount.service. May 17 00:33:35.756437 kernel: hv_netvsc 7c1e5202-d73c-7c1e-5202-d73c7c1e5202 eth0: Data path switched to VF: enP60519s1 May 17 00:33:35.756676 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:33:35.756829 systemd-networkd[828]: enP60519s1: Link UP May 17 00:33:35.757890 systemd-networkd[828]: eth0: Link UP May 17 00:33:35.758054 systemd-networkd[828]: eth0: Gained carrier May 17 00:33:35.762973 systemd-networkd[828]: enP60519s1: Gained carrier May 17 00:33:35.796439 systemd[1]: Finished ignition-setup.service. May 17 00:33:35.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:35.796920 systemd-networkd[828]: eth0: DHCPv4 address 10.200.4.40/24, gateway 10.200.4.1 acquired from 168.63.129.16 May 17 00:33:35.799811 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:33:36.806995 systemd-networkd[828]: eth0: Gained IPv6LL May 17 00:33:39.210288 ignition[855]: Ignition 2.14.0 May 17 00:33:39.210304 ignition[855]: Stage: fetch-offline May 17 00:33:39.210397 ignition[855]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:33:39.210447 ignition[855]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:33:39.304637 ignition[855]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:33:39.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.306033 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:33:39.329960 kernel: kauditd_printk_skb: 18 callbacks suppressed May 17 00:33:39.329994 kernel: audit: type=1130 audit(1747442019.309:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.304834 ignition[855]: parsed url from cmdline: "" May 17 00:33:39.311445 systemd[1]: Starting ignition-fetch.service... May 17 00:33:39.304839 ignition[855]: no config URL provided May 17 00:33:39.304846 ignition[855]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:33:39.304857 ignition[855]: no config at "/usr/lib/ignition/user.ign" May 17 00:33:39.304863 ignition[855]: failed to fetch config: resource requires networking May 17 00:33:39.305191 ignition[855]: Ignition finished successfully May 17 00:33:39.319626 ignition[861]: Ignition 2.14.0 May 17 00:33:39.319632 ignition[861]: Stage: fetch May 17 00:33:39.319733 ignition[861]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:33:39.319759 ignition[861]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:33:39.323375 ignition[861]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:33:39.324953 ignition[861]: parsed url from cmdline: "" May 17 00:33:39.324959 ignition[861]: no config URL provided May 17 00:33:39.324966 ignition[861]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:33:39.324982 ignition[861]: no config at "/usr/lib/ignition/user.ign" May 17 00:33:39.325034 ignition[861]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 May 17 00:33:39.397546 ignition[861]: GET result: OK May 17 00:33:39.397668 ignition[861]: config has been read from IMDS userdata May 17 00:33:39.397708 ignition[861]: parsing config with SHA512: 07968ebcbb582fd09efb7a7127074df93766a84d42d0825d4f5dd0b3210afcf5cc28cb2a62b080e41d99fae4243e21c244fc49d93df6b9d3b47d94f2292e28bd May 17 00:33:39.402013 unknown[861]: fetched base config from "system" May 17 00:33:39.402137 unknown[861]: fetched base config from "system" May 17 00:33:39.402819 ignition[861]: fetch: fetch complete May 17 00:33:39.402147 unknown[861]: fetched user config from "azure" May 17 00:33:39.402826 ignition[861]: fetch: fetch passed May 17 00:33:39.402870 ignition[861]: Ignition finished successfully May 17 00:33:39.409911 systemd[1]: Finished ignition-fetch.service. May 17 00:33:39.432952 kernel: audit: type=1130 audit(1747442019.414:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.416080 systemd[1]: Starting ignition-kargs.service... May 17 00:33:39.441526 ignition[867]: Ignition 2.14.0 May 17 00:33:39.441537 ignition[867]: Stage: kargs May 17 00:33:39.441672 ignition[867]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:33:39.441705 ignition[867]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:33:39.451443 ignition[867]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:33:39.452524 ignition[867]: kargs: kargs passed May 17 00:33:39.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.454221 systemd[1]: Finished ignition-kargs.service. May 17 00:33:39.471244 kernel: audit: type=1130 audit(1747442019.455:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.452563 ignition[867]: Ignition finished successfully May 17 00:33:39.468144 systemd[1]: Starting ignition-disks.service... May 17 00:33:39.476701 ignition[873]: Ignition 2.14.0 May 17 00:33:39.476707 ignition[873]: Stage: disks May 17 00:33:39.476855 ignition[873]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:33:39.476882 ignition[873]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:33:39.481933 ignition[873]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:33:39.484282 ignition[873]: disks: disks passed May 17 00:33:39.503650 kernel: audit: type=1130 audit(1747442019.487:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.484992 systemd[1]: Finished ignition-disks.service. May 17 00:33:39.484322 ignition[873]: Ignition finished successfully May 17 00:33:39.487922 systemd[1]: Reached target initrd-root-device.target. May 17 00:33:39.503633 systemd[1]: Reached target local-fs-pre.target. May 17 00:33:39.505703 systemd[1]: Reached target local-fs.target. May 17 00:33:39.507795 systemd[1]: Reached target sysinit.target. May 17 00:33:39.509686 systemd[1]: Reached target basic.target. May 17 00:33:39.511500 systemd[1]: Starting systemd-fsck-root.service... May 17 00:33:39.575743 systemd-fsck[881]: ROOT: clean, 619/7326000 files, 481079/7359488 blocks May 17 00:33:39.585568 systemd[1]: Finished systemd-fsck-root.service. May 17 00:33:39.603651 kernel: audit: type=1130 audit(1747442019.587:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:39.600668 systemd[1]: Mounting sysroot.mount... May 17 00:33:39.619814 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:33:39.620110 systemd[1]: Mounted sysroot.mount. May 17 00:33:39.622055 systemd[1]: Reached target initrd-root-fs.target. May 17 00:33:39.656702 systemd[1]: Mounting sysroot-usr.mount... May 17 00:33:39.662523 systemd[1]: Starting flatcar-metadata-hostname.service... May 17 00:33:39.667449 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:33:39.668363 systemd[1]: Reached target ignition-diskful.target. May 17 00:33:39.676676 systemd[1]: Mounted sysroot-usr.mount. May 17 00:33:39.728706 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:33:39.734256 systemd[1]: Starting initrd-setup-root.service... May 17 00:33:39.749817 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (892) May 17 00:33:39.756261 initrd-setup-root[897]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:33:39.765424 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:33:39.765444 kernel: BTRFS info (device sda6): using free space tree May 17 00:33:39.765459 kernel: BTRFS info (device sda6): has skinny extents May 17 00:33:39.767740 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:33:39.783010 initrd-setup-root[923]: cut: /sysroot/etc/group: No such file or directory May 17 00:33:39.802402 initrd-setup-root[931]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:33:39.806781 initrd-setup-root[939]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:33:40.389960 systemd[1]: Finished initrd-setup-root.service. May 17 00:33:40.406286 kernel: audit: type=1130 audit(1747442020.391:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:40.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:40.404362 systemd[1]: Starting ignition-mount.service... May 17 00:33:40.410905 systemd[1]: Starting sysroot-boot.service... May 17 00:33:40.421424 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 17 00:33:40.423914 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 17 00:33:40.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:40.441542 systemd[1]: Finished sysroot-boot.service. May 17 00:33:40.457996 kernel: audit: type=1130 audit(1747442020.443:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:40.458018 ignition[959]: INFO : Ignition 2.14.0 May 17 00:33:40.458018 ignition[959]: INFO : Stage: mount May 17 00:33:40.458018 ignition[959]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:33:40.458018 ignition[959]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:33:40.458018 ignition[959]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:33:40.484450 kernel: audit: type=1130 audit(1747442020.466:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:40.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:40.463052 systemd[1]: Finished ignition-mount.service. May 17 00:33:40.486464 ignition[959]: INFO : mount: mount passed May 17 00:33:40.486464 ignition[959]: INFO : Ignition finished successfully May 17 00:33:41.191340 coreos-metadata[891]: May 17 00:33:41.191 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 May 17 00:33:41.209023 coreos-metadata[891]: May 17 00:33:41.208 INFO Fetch successful May 17 00:33:41.242083 coreos-metadata[891]: May 17 00:33:41.241 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 May 17 00:33:41.257163 coreos-metadata[891]: May 17 00:33:41.257 INFO Fetch successful May 17 00:33:41.274496 coreos-metadata[891]: May 17 00:33:41.274 INFO wrote hostname ci-3510.3.7-n-6a88388a60 to /sysroot/etc/hostname May 17 00:33:41.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:41.276411 systemd[1]: Finished flatcar-metadata-hostname.service. May 17 00:33:41.295775 kernel: audit: type=1130 audit(1747442021.279:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:41.281032 systemd[1]: Starting ignition-files.service... May 17 00:33:41.299043 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:33:41.314826 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (970) May 17 00:33:41.314860 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:33:41.322490 kernel: BTRFS info (device sda6): using free space tree May 17 00:33:41.322514 kernel: BTRFS info (device sda6): has skinny extents May 17 00:33:41.330668 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:33:41.343167 ignition[989]: INFO : Ignition 2.14.0 May 17 00:33:41.343167 ignition[989]: INFO : Stage: files May 17 00:33:41.346749 ignition[989]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:33:41.346749 ignition[989]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:33:41.376090 ignition[989]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:33:41.392874 ignition[989]: DEBUG : files: compiled without relabeling support, skipping May 17 00:33:41.395875 ignition[989]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:33:41.395875 ignition[989]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:33:41.429113 ignition[989]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:33:41.433055 ignition[989]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:33:41.445400 unknown[989]: wrote ssh authorized keys file for user: core May 17 00:33:41.448093 ignition[989]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:33:41.451658 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" May 17 00:33:41.456139 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.3-linux-amd64.tar.gz: attempt #1 May 17 00:33:41.728644 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 17 00:33:41.786278 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" May 17 00:33:41.791151 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 17 00:33:41.791151 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:33:41.791151 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 17 00:33:41.791151 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 17 00:33:41.791151 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:33:41.791151 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:33:41.791151 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:33:41.791151 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:33:41.791151 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:33:41.791151 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:33:41.791151 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:33:41.791151 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:33:41.791151 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" May 17 00:33:41.791151 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:33:41.855590 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2069222407" May 17 00:33:41.855590 ignition[989]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2069222407": device or resource busy May 17 00:33:41.855590 ignition[989]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2069222407", trying btrfs: device or resource busy May 17 00:33:41.855590 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2069222407" May 17 00:33:41.855590 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2069222407" May 17 00:33:41.855590 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2069222407" May 17 00:33:41.855590 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2069222407" May 17 00:33:41.855590 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" May 17 00:33:41.855590 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:33:41.855590 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition May 17 00:33:41.855590 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3054659584" May 17 00:33:41.855590 ignition[989]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3054659584": device or resource busy May 17 00:33:41.855590 ignition[989]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3054659584", trying btrfs: device or resource busy May 17 00:33:41.855590 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3054659584" May 17 00:33:41.801041 systemd[1]: mnt-oem2069222407.mount: Deactivated successfully. May 17 00:33:41.924097 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3054659584" May 17 00:33:41.924097 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem3054659584" May 17 00:33:41.924097 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem3054659584" May 17 00:33:41.924097 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:33:41.924097 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:33:41.924097 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 May 17 00:33:42.660138 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK May 17 00:33:42.863570 ignition[989]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:33:42.863570 ignition[989]: INFO : files: op(13): [started] processing unit "waagent.service" May 17 00:33:42.863570 ignition[989]: INFO : files: op(13): [finished] processing unit "waagent.service" May 17 00:33:42.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:42.889030 ignition[989]: INFO : files: op(14): [started] processing unit "nvidia.service" May 17 00:33:42.889030 ignition[989]: INFO : files: op(14): [finished] processing unit "nvidia.service" May 17 00:33:42.889030 ignition[989]: INFO : files: op(15): [started] processing unit "prepare-helm.service" May 17 00:33:42.889030 ignition[989]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:33:42.889030 ignition[989]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:33:42.889030 ignition[989]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" May 17 00:33:42.889030 ignition[989]: INFO : files: op(17): [started] setting preset to enabled for "waagent.service" May 17 00:33:42.889030 ignition[989]: INFO : files: op(17): [finished] setting preset to enabled for "waagent.service" May 17 00:33:42.889030 ignition[989]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" May 17 00:33:42.889030 ignition[989]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" May 17 00:33:42.889030 ignition[989]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" May 17 00:33:42.889030 ignition[989]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" May 17 00:33:42.889030 ignition[989]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:33:42.889030 ignition[989]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:33:42.889030 ignition[989]: INFO : files: files passed May 17 00:33:42.889030 ignition[989]: INFO : Ignition finished successfully May 17 00:33:42.942453 kernel: audit: type=1130 audit(1747442022.875:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:42.870137 systemd[1]: Finished ignition-files.service. May 17 00:33:42.942364 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:33:42.949644 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:33:42.954260 systemd[1]: Starting ignition-quench.service... May 17 00:33:42.959565 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:33:42.960513 systemd[1]: Finished ignition-quench.service. May 17 00:33:42.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:42.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:42.969436 initrd-setup-root-after-ignition[1014]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:33:42.971314 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:33:42.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:42.978138 systemd[1]: Reached target ignition-complete.target. May 17 00:33:42.982919 systemd[1]: Starting initrd-parse-etc.service... May 17 00:33:42.996306 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:33:42.997187 systemd[1]: Finished initrd-parse-etc.service. May 17 00:33:43.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.005037 systemd[1]: Reached target initrd-fs.target. May 17 00:33:43.008734 systemd[1]: Reached target initrd.target. May 17 00:33:43.012366 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:33:43.013631 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:33:43.024614 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:33:43.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.027514 systemd[1]: Starting initrd-cleanup.service... May 17 00:33:43.040736 systemd[1]: Stopped target nss-lookup.target. May 17 00:33:43.044813 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:33:43.049209 systemd[1]: Stopped target timers.target. May 17 00:33:43.053053 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:33:43.055474 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:33:43.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.059608 systemd[1]: Stopped target initrd.target. May 17 00:33:43.063238 systemd[1]: Stopped target basic.target. May 17 00:33:43.066931 systemd[1]: Stopped target ignition-complete.target. May 17 00:33:43.071080 systemd[1]: Stopped target ignition-diskful.target. May 17 00:33:43.075119 systemd[1]: Stopped target initrd-root-device.target. May 17 00:33:43.079469 systemd[1]: Stopped target remote-fs.target. May 17 00:33:43.083603 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:33:43.087531 systemd[1]: Stopped target sysinit.target. May 17 00:33:43.093427 systemd[1]: Stopped target local-fs.target. May 17 00:33:43.096927 systemd[1]: Stopped target local-fs-pre.target. May 17 00:33:43.101092 systemd[1]: Stopped target swap.target. May 17 00:33:43.104563 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:33:43.107351 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:33:43.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.111486 systemd[1]: Stopped target cryptsetup.target. May 17 00:33:43.115348 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:33:43.117652 systemd[1]: Stopped dracut-initqueue.service. May 17 00:33:43.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.121782 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:33:43.124591 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:33:43.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.129535 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:33:43.131755 systemd[1]: Stopped ignition-files.service. May 17 00:33:43.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.135124 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. May 17 00:33:43.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.135235 systemd[1]: Stopped flatcar-metadata-hostname.service. May 17 00:33:43.152836 iscsid[836]: iscsid shutting down. May 17 00:33:43.143591 systemd[1]: Stopping ignition-mount.service... May 17 00:33:43.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.157779 ignition[1027]: INFO : Ignition 2.14.0 May 17 00:33:43.157779 ignition[1027]: INFO : Stage: umount May 17 00:33:43.157779 ignition[1027]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:33:43.157779 ignition[1027]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 17 00:33:43.145748 systemd[1]: Stopping iscsid.service... May 17 00:33:43.172511 ignition[1027]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 17 00:33:43.148455 systemd[1]: Stopping sysroot-boot.service... May 17 00:33:43.150545 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:33:43.181975 ignition[1027]: INFO : umount: umount passed May 17 00:33:43.181975 ignition[1027]: INFO : Ignition finished successfully May 17 00:33:43.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.150766 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:33:43.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.155552 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:33:43.155741 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:33:43.183505 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:33:43.183608 systemd[1]: Stopped iscsid.service. May 17 00:33:43.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.199578 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:33:43.199684 systemd[1]: Stopped ignition-mount.service. May 17 00:33:43.202039 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:33:43.211092 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:33:43.213595 systemd[1]: Finished initrd-cleanup.service. May 17 00:33:43.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.216847 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:33:43.216891 systemd[1]: Stopped ignition-disks.service. May 17 00:33:43.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.223341 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:33:43.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.223387 systemd[1]: Stopped ignition-kargs.service. May 17 00:33:43.227144 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 00:33:43.227191 systemd[1]: Stopped ignition-fetch.service. May 17 00:33:43.229152 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:33:43.229187 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:33:43.233610 systemd[1]: Stopped target paths.target. May 17 00:33:43.237313 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:33:43.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.241741 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:33:43.244260 systemd[1]: Stopped target slices.target. May 17 00:33:43.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.245973 systemd[1]: Stopped target sockets.target. May 17 00:33:43.252688 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:33:43.252732 systemd[1]: Closed iscsid.socket. May 17 00:33:43.256235 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:33:43.256284 systemd[1]: Stopped ignition-setup.service. May 17 00:33:43.262788 systemd[1]: Stopping iscsiuio.service... May 17 00:33:43.264554 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:33:43.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.264647 systemd[1]: Stopped iscsiuio.service. May 17 00:33:43.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.267970 systemd[1]: Stopped target network.target. May 17 00:33:43.271661 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:33:43.271703 systemd[1]: Closed iscsiuio.socket. May 17 00:33:43.275368 systemd[1]: Stopping systemd-networkd.service... May 17 00:33:43.278471 systemd[1]: Stopping systemd-resolved.service... May 17 00:33:43.282849 systemd-networkd[828]: eth0: DHCPv6 lease lost May 17 00:33:43.305000 audit: BPF prog-id=9 op=UNLOAD May 17 00:33:43.285030 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:33:43.285118 systemd[1]: Stopped systemd-networkd.service. May 17 00:33:43.311000 audit: BPF prog-id=6 op=UNLOAD May 17 00:33:43.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.288170 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:33:43.288259 systemd[1]: Stopped systemd-resolved.service. May 17 00:33:43.292495 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:33:43.292523 systemd[1]: Closed systemd-networkd.socket. May 17 00:33:43.309438 systemd[1]: Stopping network-cleanup.service... May 17 00:33:43.311108 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:33:43.311178 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:33:43.313419 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:33:43.313494 systemd[1]: Stopped systemd-sysctl.service. May 17 00:33:43.315455 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:33:43.315501 systemd[1]: Stopped systemd-modules-load.service. May 17 00:33:43.318034 systemd[1]: Stopping systemd-udevd.service... May 17 00:33:43.321752 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:33:43.322192 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:33:43.322296 systemd[1]: Stopped systemd-udevd.service. May 17 00:33:43.338175 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:33:43.338228 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:33:43.342592 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:33:43.342633 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:33:43.349532 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:33:43.351425 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:33:43.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.377632 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:33:43.377695 systemd[1]: Stopped dracut-cmdline.service. May 17 00:33:43.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.383722 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:33:43.383773 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:33:43.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.390551 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:33:43.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.392716 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 17 00:33:43.411382 kernel: hv_netvsc 7c1e5202-d73c-7c1e-5202-d73c7c1e5202 eth0: Data path switched from VF: enP60519s1 May 17 00:33:43.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.392777 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 17 00:33:43.395286 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:33:43.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.395338 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:33:43.400012 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:33:43.400064 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:33:43.407915 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 17 00:33:43.408508 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:33:43.408611 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:33:43.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.431483 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:33:43.431572 systemd[1]: Stopped network-cleanup.service. May 17 00:33:43.702120 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:33:43.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.702266 systemd[1]: Stopped sysroot-boot.service. May 17 00:33:43.706483 systemd[1]: Reached target initrd-switch-root.target. May 17 00:33:43.712706 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:33:43.712768 systemd[1]: Stopped initrd-setup-root.service. May 17 00:33:43.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:43.719776 systemd[1]: Starting initrd-switch-root.service... May 17 00:33:43.730643 systemd[1]: Switching root. May 17 00:33:43.756337 systemd-journald[183]: Journal stopped May 17 00:33:59.169841 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). May 17 00:33:59.169868 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:33:59.169882 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:33:59.169891 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:33:59.169902 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:33:59.169912 kernel: SELinux: policy capability open_perms=1 May 17 00:33:59.169925 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:33:59.169937 kernel: SELinux: policy capability always_check_network=0 May 17 00:33:59.169947 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:33:59.169956 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:33:59.169964 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:33:59.169975 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:33:59.169985 kernel: kauditd_printk_skb: 43 callbacks suppressed May 17 00:33:59.169996 kernel: audit: type=1403 audit(1747442026.244:82): auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:33:59.170011 systemd[1]: Successfully loaded SELinux policy in 313.853ms. May 17 00:33:59.170025 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 29.088ms. May 17 00:33:59.170035 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:33:59.170048 systemd[1]: Detected virtualization microsoft. May 17 00:33:59.170063 systemd[1]: Detected architecture x86-64. May 17 00:33:59.170072 systemd[1]: Detected first boot. May 17 00:33:59.170085 systemd[1]: Hostname set to . May 17 00:33:59.170097 systemd[1]: Initializing machine ID from random generator. May 17 00:33:59.170108 kernel: audit: type=1400 audit(1747442027.038:83): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:33:59.170121 kernel: audit: type=1400 audit(1747442027.057:84): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:33:59.170133 kernel: audit: type=1400 audit(1747442027.057:85): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:33:59.170144 kernel: audit: type=1334 audit(1747442027.070:86): prog-id=10 op=LOAD May 17 00:33:59.170156 kernel: audit: type=1334 audit(1747442027.070:87): prog-id=10 op=UNLOAD May 17 00:33:59.170166 kernel: audit: type=1334 audit(1747442027.082:88): prog-id=11 op=LOAD May 17 00:33:59.170176 kernel: audit: type=1334 audit(1747442027.082:89): prog-id=11 op=UNLOAD May 17 00:33:59.170185 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:33:59.170196 kernel: audit: type=1400 audit(1747442028.814:90): avc: denied { associate } for pid=1062 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:33:59.170209 kernel: audit: type=1300 audit(1747442028.814:90): arch=c000003e syscall=188 success=yes exit=0 a0=c00018c522 a1=c0001805e8 a2=c0001909c0 a3=32 items=0 ppid=1045 pid=1062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:59.170221 systemd[1]: Populated /etc with preset unit settings. May 17 00:33:59.170233 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:33:59.170246 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:33:59.170256 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:33:59.170268 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:33:59.170279 kernel: audit: type=1334 audit(1747442038.629:92): prog-id=12 op=LOAD May 17 00:33:59.170288 kernel: audit: type=1334 audit(1747442038.629:93): prog-id=3 op=UNLOAD May 17 00:33:59.170302 kernel: audit: type=1334 audit(1747442038.638:94): prog-id=13 op=LOAD May 17 00:33:59.170316 kernel: audit: type=1334 audit(1747442038.647:95): prog-id=14 op=LOAD May 17 00:33:59.170326 kernel: audit: type=1334 audit(1747442038.647:96): prog-id=4 op=UNLOAD May 17 00:33:59.170339 kernel: audit: type=1334 audit(1747442038.647:97): prog-id=5 op=UNLOAD May 17 00:33:59.170349 kernel: audit: type=1334 audit(1747442038.657:98): prog-id=15 op=LOAD May 17 00:33:59.170360 kernel: audit: type=1334 audit(1747442038.657:99): prog-id=12 op=UNLOAD May 17 00:33:59.170370 kernel: audit: type=1334 audit(1747442038.661:100): prog-id=16 op=LOAD May 17 00:33:59.170381 kernel: audit: type=1334 audit(1747442038.665:101): prog-id=17 op=LOAD May 17 00:33:59.170393 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:33:59.170405 systemd[1]: Stopped initrd-switch-root.service. May 17 00:33:59.170418 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:33:59.170431 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:33:59.170446 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:33:59.170463 systemd[1]: Created slice system-getty.slice. May 17 00:33:59.170484 systemd[1]: Created slice system-modprobe.slice. May 17 00:33:59.170505 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:33:59.170524 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:33:59.170548 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:33:59.170567 systemd[1]: Created slice user.slice. May 17 00:33:59.170587 systemd[1]: Started systemd-ask-password-console.path. May 17 00:33:59.170609 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:33:59.170628 systemd[1]: Set up automount boot.automount. May 17 00:33:59.170646 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:33:59.170666 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:33:59.170684 systemd[1]: Stopped target initrd-fs.target. May 17 00:33:59.170703 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:33:59.170726 systemd[1]: Reached target integritysetup.target. May 17 00:33:59.170746 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:33:59.170763 systemd[1]: Reached target remote-fs.target. May 17 00:33:59.170782 systemd[1]: Reached target slices.target. May 17 00:33:59.170813 systemd[1]: Reached target swap.target. May 17 00:33:59.170834 systemd[1]: Reached target torcx.target. May 17 00:33:59.170854 systemd[1]: Reached target veritysetup.target. May 17 00:33:59.170875 systemd[1]: Listening on systemd-coredump.socket. May 17 00:33:59.170896 systemd[1]: Listening on systemd-initctl.socket. May 17 00:33:59.170913 systemd[1]: Listening on systemd-networkd.socket. May 17 00:33:59.170933 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:33:59.170953 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:33:59.170975 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:33:59.170994 systemd[1]: Mounting dev-hugepages.mount... May 17 00:33:59.171012 systemd[1]: Mounting dev-mqueue.mount... May 17 00:33:59.171030 systemd[1]: Mounting media.mount... May 17 00:33:59.171050 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:33:59.171068 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:33:59.171087 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:33:59.171106 systemd[1]: Mounting tmp.mount... May 17 00:33:59.171126 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:33:59.171146 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:33:59.171168 systemd[1]: Starting kmod-static-nodes.service... May 17 00:33:59.171187 systemd[1]: Starting modprobe@configfs.service... May 17 00:33:59.171206 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:33:59.171223 systemd[1]: Starting modprobe@drm.service... May 17 00:33:59.171241 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:33:59.171261 systemd[1]: Starting modprobe@fuse.service... May 17 00:33:59.171279 systemd[1]: Starting modprobe@loop.service... May 17 00:33:59.171298 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:33:59.171322 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:33:59.171344 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:33:59.171361 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:33:59.171377 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:33:59.171404 systemd[1]: Stopped systemd-journald.service. May 17 00:33:59.171420 systemd[1]: Starting systemd-journald.service... May 17 00:33:59.171434 systemd[1]: Starting systemd-modules-load.service... May 17 00:33:59.171447 systemd[1]: Starting systemd-network-generator.service... May 17 00:33:59.171466 systemd[1]: Starting systemd-remount-fs.service... May 17 00:33:59.171477 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:33:59.171490 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:33:59.171499 systemd[1]: Stopped verity-setup.service. May 17 00:33:59.171512 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:33:59.171522 systemd[1]: Mounted dev-hugepages.mount. May 17 00:33:59.171535 kernel: loop: module loaded May 17 00:33:59.171544 systemd[1]: Mounted dev-mqueue.mount. May 17 00:33:59.171557 systemd[1]: Mounted media.mount. May 17 00:33:59.171571 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:33:59.171582 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:33:59.171594 systemd[1]: Mounted tmp.mount. May 17 00:33:59.171605 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:33:59.171616 systemd[1]: Finished kmod-static-nodes.service. May 17 00:33:59.171628 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:33:59.171647 systemd[1]: Finished modprobe@configfs.service. May 17 00:33:59.171658 kernel: fuse: init (API version 7.34) May 17 00:33:59.171670 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:33:59.171680 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:33:59.171692 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:33:59.171704 systemd[1]: Finished modprobe@drm.service. May 17 00:33:59.171715 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:33:59.171725 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:33:59.171735 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:33:59.171744 systemd[1]: Finished modprobe@fuse.service. May 17 00:33:59.171755 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:33:59.171765 systemd[1]: Finished modprobe@loop.service. May 17 00:33:59.171774 systemd[1]: Finished systemd-modules-load.service. May 17 00:33:59.171789 systemd-journald[1147]: Journal started May 17 00:33:59.171897 systemd-journald[1147]: Runtime Journal (/run/log/journal/7b9a93dd9b7c4579be80bec71d7c98e3) is 8.0M, max 159.0M, 151.0M free. May 17 00:33:46.244000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:33:47.038000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:33:47.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:33:47.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:33:47.070000 audit: BPF prog-id=10 op=LOAD May 17 00:33:47.070000 audit: BPF prog-id=10 op=UNLOAD May 17 00:33:47.082000 audit: BPF prog-id=11 op=LOAD May 17 00:33:47.082000 audit: BPF prog-id=11 op=UNLOAD May 17 00:33:48.814000 audit[1062]: AVC avc: denied { associate } for pid=1062 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:33:48.814000 audit[1062]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00018c522 a1=c0001805e8 a2=c0001909c0 a3=32 items=0 ppid=1045 pid=1062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:48.814000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:33:48.822000 audit[1062]: AVC avc: denied { associate } for pid=1062 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:33:48.822000 audit[1062]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00018c5f9 a2=1ed a3=0 items=2 ppid=1045 pid=1062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:48.822000 audit: CWD cwd="/" May 17 00:33:48.822000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:48.822000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:48.822000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:33:58.629000 audit: BPF prog-id=12 op=LOAD May 17 00:33:58.629000 audit: BPF prog-id=3 op=UNLOAD May 17 00:33:58.638000 audit: BPF prog-id=13 op=LOAD May 17 00:33:58.647000 audit: BPF prog-id=14 op=LOAD May 17 00:33:58.647000 audit: BPF prog-id=4 op=UNLOAD May 17 00:33:58.647000 audit: BPF prog-id=5 op=UNLOAD May 17 00:33:58.657000 audit: BPF prog-id=15 op=LOAD May 17 00:33:58.657000 audit: BPF prog-id=12 op=UNLOAD May 17 00:33:58.661000 audit: BPF prog-id=16 op=LOAD May 17 00:33:58.665000 audit: BPF prog-id=17 op=LOAD May 17 00:33:58.665000 audit: BPF prog-id=13 op=UNLOAD May 17 00:33:58.665000 audit: BPF prog-id=14 op=UNLOAD May 17 00:33:58.670000 audit: BPF prog-id=18 op=LOAD May 17 00:33:58.670000 audit: BPF prog-id=15 op=UNLOAD May 17 00:33:58.675000 audit: BPF prog-id=19 op=LOAD May 17 00:33:58.679000 audit: BPF prog-id=20 op=LOAD May 17 00:33:58.679000 audit: BPF prog-id=16 op=UNLOAD May 17 00:33:58.679000 audit: BPF prog-id=17 op=UNLOAD May 17 00:33:58.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:58.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:58.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:58.702000 audit: BPF prog-id=18 op=UNLOAD May 17 00:33:58.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:58.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:58.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:58.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:58.992000 audit: BPF prog-id=21 op=LOAD May 17 00:33:58.992000 audit: BPF prog-id=22 op=LOAD May 17 00:33:58.992000 audit: BPF prog-id=23 op=LOAD May 17 00:33:58.992000 audit: BPF prog-id=19 op=UNLOAD May 17 00:33:58.992000 audit: BPF prog-id=20 op=UNLOAD May 17 00:33:59.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.167000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:33:59.167000 audit[1147]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe601a0e60 a2=4000 a3=7ffe601a0efc items=0 ppid=1 pid=1147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:59.167000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:33:59.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.681386 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:33:58.628200 systemd[1]: Queued start job for default target multi-user.target. May 17 00:33:48.710747 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:48Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:33:58.628212 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 17 00:33:48.710769 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:48Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:33:58.680956 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:33:59.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.710837 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:48Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:33:48.710853 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:48Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:33:48.710921 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:48Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:33:48.710941 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:48Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:33:48.711160 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:48Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:33:48.711203 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:48Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:33:48.711220 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:48Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:33:48.797906 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:48Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:33:48.797988 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:48Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:33:59.179856 systemd[1]: Started systemd-journald.service. May 17 00:33:48.798024 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:48Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:33:48.798051 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:48Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:33:48.798078 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:48Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:33:59.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:48.798103 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:48Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:33:57.400712 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:57Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:33:57.400979 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:57Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:33:57.401099 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:57Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:33:57.401269 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:57Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:33:57.401318 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:57Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:33:57.401372 /usr/lib/systemd/system-generators/torcx-generator[1062]: time="2025-05-17T00:33:57Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:33:59.181209 systemd[1]: Finished systemd-network-generator.service. May 17 00:33:59.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.183717 systemd[1]: Finished systemd-remount-fs.service. May 17 00:33:59.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.186957 systemd[1]: Reached target network-pre.target. May 17 00:33:59.190679 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:33:59.194090 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:33:59.198048 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:33:59.215627 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:33:59.218895 systemd[1]: Starting systemd-journal-flush.service... May 17 00:33:59.220975 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:33:59.222216 systemd[1]: Starting systemd-random-seed.service... May 17 00:33:59.224129 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:33:59.225571 systemd[1]: Starting systemd-sysctl.service... May 17 00:33:59.229272 systemd[1]: Starting systemd-sysusers.service... May 17 00:33:59.235581 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:33:59.238319 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:33:59.251406 systemd[1]: Finished systemd-random-seed.service. May 17 00:33:59.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.253776 systemd[1]: Reached target first-boot-complete.target. May 17 00:33:59.259879 systemd-journald[1147]: Time spent on flushing to /var/log/journal/7b9a93dd9b7c4579be80bec71d7c98e3 is 14.922ms for 1161 entries. May 17 00:33:59.259879 systemd-journald[1147]: System Journal (/var/log/journal/7b9a93dd9b7c4579be80bec71d7c98e3) is 8.0M, max 2.6G, 2.6G free. May 17 00:33:59.369844 systemd-journald[1147]: Received client request to flush runtime journal. May 17 00:33:59.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.265741 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:33:59.269316 systemd[1]: Starting systemd-udev-settle.service... May 17 00:33:59.370362 udevadm[1186]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 17 00:33:59.291473 systemd[1]: Finished systemd-sysctl.service. May 17 00:33:59.370970 systemd[1]: Finished systemd-journal-flush.service. May 17 00:33:59.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.910384 systemd[1]: Finished systemd-sysusers.service. May 17 00:33:59.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.914134 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:34:00.235423 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:34:00.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:00.868835 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:34:00.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:00.871000 audit: BPF prog-id=24 op=LOAD May 17 00:34:00.871000 audit: BPF prog-id=25 op=LOAD May 17 00:34:00.871000 audit: BPF prog-id=7 op=UNLOAD May 17 00:34:00.871000 audit: BPF prog-id=8 op=UNLOAD May 17 00:34:00.872652 systemd[1]: Starting systemd-udevd.service... May 17 00:34:00.890146 systemd-udevd[1190]: Using default interface naming scheme 'v252'. May 17 00:34:01.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:01.083000 audit: BPF prog-id=26 op=LOAD May 17 00:34:01.080376 systemd[1]: Started systemd-udevd.service. May 17 00:34:01.085468 systemd[1]: Starting systemd-networkd.service... May 17 00:34:01.122907 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:34:01.182000 audit: BPF prog-id=27 op=LOAD May 17 00:34:01.183000 audit: BPF prog-id=28 op=LOAD May 17 00:34:01.183000 audit: BPF prog-id=29 op=LOAD May 17 00:34:01.184744 systemd[1]: Starting systemd-userdbd.service... May 17 00:34:01.198000 audit[1193]: AVC avc: denied { confidentiality } for pid=1193 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:34:01.216816 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:34:01.222820 kernel: hv_vmbus: registering driver hv_balloon May 17 00:34:01.229825 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 May 17 00:34:01.234035 kernel: hv_vmbus: registering driver hyperv_fb May 17 00:34:01.234115 kernel: hyperv_fb: Synthvid Version major 3, minor 5 May 17 00:34:01.243209 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 May 17 00:34:01.247684 kernel: Console: switching to colour dummy device 80x25 May 17 00:34:01.249852 kernel: Console: switching to colour frame buffer device 128x48 May 17 00:34:01.259550 kernel: hv_utils: Registering HyperV Utility Driver May 17 00:34:01.259675 kernel: hv_vmbus: registering driver hv_utils May 17 00:34:01.198000 audit[1193]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=559750d84aa0 a1=f884 a2=7f198fc3bbc5 a3=5 items=12 ppid=1190 pid=1193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.198000 audit: CWD cwd="/" May 17 00:34:01.198000 audit: PATH item=0 name=(null) inode=237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:01.198000 audit: PATH item=1 name=(null) inode=15401 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:01.198000 audit: PATH item=2 name=(null) inode=15401 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:01.198000 audit: PATH item=3 name=(null) inode=15402 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:01.198000 audit: PATH item=4 name=(null) inode=15401 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:01.198000 audit: PATH item=5 name=(null) inode=15403 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:01.198000 audit: PATH item=6 name=(null) inode=15401 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:01.198000 audit: PATH item=7 name=(null) inode=15404 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:01.198000 audit: PATH item=8 name=(null) inode=15401 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:01.198000 audit: PATH item=9 name=(null) inode=15405 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:01.198000 audit: PATH item=10 name=(null) inode=15401 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:01.198000 audit: PATH item=11 name=(null) inode=15406 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:01.198000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:34:01.298040 kernel: hv_utils: Heartbeat IC version 3.0 May 17 00:34:01.298142 kernel: hv_utils: Shutdown IC version 3.2 May 17 00:34:01.298167 kernel: hv_utils: TimeSync IC version 4.0 May 17 00:34:01.864552 systemd[1]: Started systemd-userdbd.service. May 17 00:34:01.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:02.047805 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:34:02.308733 kernel: KVM: vmx: using Hyper-V Enlightened VMCS May 17 00:34:02.343790 systemd[1]: Finished systemd-udev-settle.service. May 17 00:34:02.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:02.347466 systemd[1]: Starting lvm2-activation-early.service... May 17 00:34:02.504371 systemd-networkd[1203]: lo: Link UP May 17 00:34:02.504383 systemd-networkd[1203]: lo: Gained carrier May 17 00:34:02.505055 systemd-networkd[1203]: Enumeration completed May 17 00:34:02.505185 systemd[1]: Started systemd-networkd.service. May 17 00:34:02.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:02.510801 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:34:02.570725 systemd-networkd[1203]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:34:02.623411 kernel: mlx5_core ec67:00:02.0 enP60519s1: Link up May 17 00:34:02.643415 kernel: hv_netvsc 7c1e5202-d73c-7c1e-5202-d73c7c1e5202 eth0: Data path switched to VF: enP60519s1 May 17 00:34:02.643563 systemd-networkd[1203]: enP60519s1: Link UP May 17 00:34:02.643700 systemd-networkd[1203]: eth0: Link UP May 17 00:34:02.643705 systemd-networkd[1203]: eth0: Gained carrier May 17 00:34:02.649693 systemd-networkd[1203]: enP60519s1: Gained carrier May 17 00:34:02.682546 systemd-networkd[1203]: eth0: DHCPv4 address 10.200.4.40/24, gateway 10.200.4.1 acquired from 168.63.129.16 May 17 00:34:02.704298 lvm[1266]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:34:02.729579 systemd[1]: Finished lvm2-activation-early.service. May 17 00:34:02.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:02.732426 systemd[1]: Reached target cryptsetup.target. May 17 00:34:02.735963 systemd[1]: Starting lvm2-activation.service... May 17 00:34:02.740596 lvm[1268]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:34:02.761545 systemd[1]: Finished lvm2-activation.service. May 17 00:34:02.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:02.763908 systemd[1]: Reached target local-fs-pre.target. May 17 00:34:02.766215 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:34:02.766251 systemd[1]: Reached target local-fs.target. May 17 00:34:02.768549 systemd[1]: Reached target machines.target. May 17 00:34:02.772335 systemd[1]: Starting ldconfig.service... May 17 00:34:02.794403 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:34:02.794505 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:34:02.796000 systemd[1]: Starting systemd-boot-update.service... May 17 00:34:02.799446 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:34:02.803463 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:34:02.807003 systemd[1]: Starting systemd-sysext.service... May 17 00:34:02.882666 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1270 (bootctl) May 17 00:34:02.884924 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:34:02.894973 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:34:02.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.014872 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:34:03.251164 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:34:03.251466 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:34:03.328412 kernel: loop0: detected capacity change from 0 to 229808 May 17 00:34:03.412415 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:34:03.429410 kernel: loop1: detected capacity change from 0 to 229808 May 17 00:34:03.437970 (sd-sysext)[1282]: Using extensions 'kubernetes'. May 17 00:34:03.438424 (sd-sysext)[1282]: Merged extensions into '/usr'. May 17 00:34:03.450841 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:34:03.451406 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:34:03.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.457615 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:34:03.459222 systemd[1]: Mounting usr-share-oem.mount... May 17 00:34:03.461608 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:34:03.464498 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:34:03.466585 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:34:03.468780 systemd[1]: Starting modprobe@loop.service... May 17 00:34:03.470228 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:34:03.470366 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:34:03.470565 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:34:03.475841 systemd[1]: Mounted usr-share-oem.mount. May 17 00:34:03.478303 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:34:03.478783 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:34:03.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.481495 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:34:03.481642 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:34:03.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.484250 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:34:03.484410 systemd[1]: Finished modprobe@loop.service. May 17 00:34:03.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.487848 systemd[1]: Finished systemd-sysext.service. May 17 00:34:03.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.491847 systemd[1]: Starting ensure-sysext.service... May 17 00:34:03.493868 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:34:03.493938 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:34:03.495246 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:34:03.503668 systemd[1]: Reloading. May 17 00:34:03.545888 systemd-tmpfiles[1289]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:34:03.569147 systemd-tmpfiles[1289]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:34:03.578955 /usr/lib/systemd/system-generators/torcx-generator[1309]: time="2025-05-17T00:34:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:34:03.579403 /usr/lib/systemd/system-generators/torcx-generator[1309]: time="2025-05-17T00:34:03Z" level=info msg="torcx already run" May 17 00:34:03.585865 systemd-tmpfiles[1289]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:34:03.666855 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:34:03.666877 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:34:03.683216 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:34:03.751000 audit: BPF prog-id=30 op=LOAD May 17 00:34:03.751000 audit: BPF prog-id=31 op=LOAD May 17 00:34:03.751000 audit: BPF prog-id=24 op=UNLOAD May 17 00:34:03.751000 audit: BPF prog-id=25 op=UNLOAD May 17 00:34:03.752000 audit: BPF prog-id=32 op=LOAD May 17 00:34:03.752000 audit: BPF prog-id=27 op=UNLOAD May 17 00:34:03.752000 audit: BPF prog-id=33 op=LOAD May 17 00:34:03.752000 audit: BPF prog-id=34 op=LOAD May 17 00:34:03.752000 audit: BPF prog-id=28 op=UNLOAD May 17 00:34:03.752000 audit: BPF prog-id=29 op=UNLOAD May 17 00:34:03.753000 audit: BPF prog-id=35 op=LOAD May 17 00:34:03.753000 audit: BPF prog-id=21 op=UNLOAD May 17 00:34:03.753000 audit: BPF prog-id=36 op=LOAD May 17 00:34:03.753000 audit: BPF prog-id=37 op=LOAD May 17 00:34:03.753000 audit: BPF prog-id=22 op=UNLOAD May 17 00:34:03.753000 audit: BPF prog-id=23 op=UNLOAD May 17 00:34:03.754000 audit: BPF prog-id=38 op=LOAD May 17 00:34:03.754000 audit: BPF prog-id=26 op=UNLOAD May 17 00:34:03.768451 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:34:03.768844 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:34:03.770237 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:34:03.772872 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:34:03.777460 systemd[1]: Starting modprobe@loop.service... May 17 00:34:03.778436 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:34:03.778549 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:34:03.778654 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:34:03.779637 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:34:03.780022 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:34:03.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.781729 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:34:03.781855 systemd[1]: Finished modprobe@loop.service. May 17 00:34:03.786559 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:34:03.786700 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:34:03.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.788881 systemd[1]: Finished ensure-sysext.service. May 17 00:34:03.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.791115 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:34:03.791362 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:34:03.792378 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:34:03.794775 systemd[1]: Starting modprobe@drm.service... May 17 00:34:03.796950 systemd[1]: Starting modprobe@loop.service... May 17 00:34:03.799513 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:34:03.799615 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:34:03.799730 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:34:03.799833 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:34:03.800385 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:34:03.800584 systemd[1]: Finished modprobe@loop.service. May 17 00:34:03.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.803381 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:34:03.803682 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:34:03.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.805008 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:34:03.805115 systemd[1]: Finished modprobe@drm.service. May 17 00:34:03.805258 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:34:04.036366 systemd-fsck[1278]: fsck.fat 4.2 (2021-01-31) May 17 00:34:04.036366 systemd-fsck[1278]: /dev/sda1: 790 files, 120726/258078 clusters May 17 00:34:04.038536 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:34:04.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.043081 systemd[1]: Mounting boot.mount... May 17 00:34:04.057537 systemd[1]: Mounted boot.mount. May 17 00:34:04.071922 systemd[1]: Finished systemd-boot-update.service. May 17 00:34:04.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.172565 systemd-networkd[1203]: eth0: Gained IPv6LL May 17 00:34:04.179215 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:34:04.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.184393 kernel: kauditd_printk_skb: 122 callbacks suppressed May 17 00:34:04.184449 kernel: audit: type=1130 audit(1747442044.180:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:05.166742 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:34:05.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:05.170592 systemd[1]: Starting audit-rules.service... May 17 00:34:05.181713 kernel: audit: type=1130 audit(1747442045.168:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:05.183251 systemd[1]: Starting clean-ca-certificates.service... May 17 00:34:05.186732 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:34:05.188000 audit: BPF prog-id=39 op=LOAD May 17 00:34:05.190977 systemd[1]: Starting systemd-resolved.service... May 17 00:34:05.194412 kernel: audit: type=1334 audit(1747442045.188:209): prog-id=39 op=LOAD May 17 00:34:05.194000 audit: BPF prog-id=40 op=LOAD May 17 00:34:05.197069 systemd[1]: Starting systemd-timesyncd.service... May 17 00:34:05.200407 kernel: audit: type=1334 audit(1747442045.194:210): prog-id=40 op=LOAD May 17 00:34:05.204486 systemd[1]: Starting systemd-update-utmp.service... May 17 00:34:05.213000 audit[1388]: SYSTEM_BOOT pid=1388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:34:05.216691 systemd[1]: Finished systemd-update-utmp.service. May 17 00:34:05.229265 kernel: audit: type=1127 audit(1747442045.213:211): pid=1388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:34:05.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:05.242424 kernel: audit: type=1130 audit(1747442045.228:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:05.266146 systemd[1]: Finished clean-ca-certificates.service. May 17 00:34:05.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:05.268496 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:34:05.281422 kernel: audit: type=1130 audit(1747442045.267:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:05.370970 systemd[1]: Started systemd-timesyncd.service. May 17 00:34:05.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:05.373466 systemd[1]: Reached target time-set.target. May 17 00:34:05.386982 kernel: audit: type=1130 audit(1747442045.371:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:05.389597 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:34:05.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:05.405413 kernel: audit: type=1130 audit(1747442045.390:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:05.410003 systemd-resolved[1386]: Positive Trust Anchors: May 17 00:34:05.410017 systemd-resolved[1386]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:34:05.410059 systemd-resolved[1386]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:34:05.550474 systemd-resolved[1386]: Using system hostname 'ci-3510.3.7-n-6a88388a60'. May 17 00:34:05.552117 systemd[1]: Started systemd-resolved.service. May 17 00:34:05.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:05.554923 systemd[1]: Reached target network.target. May 17 00:34:05.568450 kernel: audit: type=1130 audit(1747442045.553:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:05.568806 augenrules[1403]: No rules May 17 00:34:05.569368 systemd[1]: Reached target network-online.target. May 17 00:34:05.567000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:34:05.567000 audit[1403]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffccc26470 a2=420 a3=0 items=0 ppid=1382 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:05.567000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:34:05.571653 systemd[1]: Reached target nss-lookup.target. May 17 00:34:05.574088 systemd[1]: Finished audit-rules.service. May 17 00:34:05.687992 systemd-timesyncd[1387]: Contacted time server 162.159.200.123:123 (0.flatcar.pool.ntp.org). May 17 00:34:05.688171 systemd-timesyncd[1387]: Initial clock synchronization to Sat 2025-05-17 00:34:05.688696 UTC. May 17 00:34:10.710338 ldconfig[1269]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:34:10.722416 systemd[1]: Finished ldconfig.service. May 17 00:34:10.725879 systemd[1]: Starting systemd-update-done.service... May 17 00:34:10.732486 systemd[1]: Finished systemd-update-done.service. May 17 00:34:10.735091 systemd[1]: Reached target sysinit.target. May 17 00:34:10.737235 systemd[1]: Started motdgen.path. May 17 00:34:10.739056 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:34:10.742069 systemd[1]: Started logrotate.timer. May 17 00:34:10.743793 systemd[1]: Started mdadm.timer. May 17 00:34:10.745340 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:34:10.747408 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:34:10.747446 systemd[1]: Reached target paths.target. May 17 00:34:10.749466 systemd[1]: Reached target timers.target. May 17 00:34:10.751549 systemd[1]: Listening on dbus.socket. May 17 00:34:10.754451 systemd[1]: Starting docker.socket... May 17 00:34:10.758607 systemd[1]: Listening on sshd.socket. May 17 00:34:10.760517 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:34:10.760936 systemd[1]: Listening on docker.socket. May 17 00:34:10.762814 systemd[1]: Reached target sockets.target. May 17 00:34:10.764777 systemd[1]: Reached target basic.target. May 17 00:34:10.766779 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:34:10.766811 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:34:10.767770 systemd[1]: Starting containerd.service... May 17 00:34:10.771011 systemd[1]: Starting dbus.service... May 17 00:34:10.774212 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:34:10.777301 systemd[1]: Starting extend-filesystems.service... May 17 00:34:10.779353 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:34:10.780756 systemd[1]: Starting kubelet.service... May 17 00:34:10.784672 systemd[1]: Starting motdgen.service... May 17 00:34:10.787634 systemd[1]: Started nvidia.service. May 17 00:34:10.791700 systemd[1]: Starting prepare-helm.service... May 17 00:34:10.795546 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:34:10.799087 systemd[1]: Starting sshd-keygen.service... May 17 00:34:10.803898 systemd[1]: Starting systemd-logind.service... May 17 00:34:10.806542 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:34:10.806620 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:34:10.807139 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:34:10.808583 systemd[1]: Starting update-engine.service... May 17 00:34:10.812550 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:34:10.823043 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:34:10.823287 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:34:10.842439 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:34:10.842662 systemd[1]: Finished motdgen.service. May 17 00:34:10.874983 extend-filesystems[1414]: Found loop1 May 17 00:34:10.880189 extend-filesystems[1414]: Found sda May 17 00:34:10.880189 extend-filesystems[1414]: Found sda1 May 17 00:34:10.880189 extend-filesystems[1414]: Found sda2 May 17 00:34:10.880189 extend-filesystems[1414]: Found sda3 May 17 00:34:10.880189 extend-filesystems[1414]: Found usr May 17 00:34:10.880189 extend-filesystems[1414]: Found sda4 May 17 00:34:10.880189 extend-filesystems[1414]: Found sda6 May 17 00:34:10.880189 extend-filesystems[1414]: Found sda7 May 17 00:34:10.880189 extend-filesystems[1414]: Found sda9 May 17 00:34:10.880189 extend-filesystems[1414]: Checking size of /dev/sda9 May 17 00:34:10.932518 jq[1428]: true May 17 00:34:10.889757 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:34:10.932760 jq[1413]: false May 17 00:34:10.889990 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:34:10.933014 jq[1442]: true May 17 00:34:10.961459 env[1435]: time="2025-05-17T00:34:10.960427091Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:34:10.992815 tar[1433]: linux-amd64/LICENSE May 17 00:34:10.993156 tar[1433]: linux-amd64/helm May 17 00:34:11.004024 env[1435]: time="2025-05-17T00:34:11.003973611Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:34:11.004299 env[1435]: time="2025-05-17T00:34:11.004274922Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:34:11.010415 extend-filesystems[1414]: Old size kept for /dev/sda9 May 17 00:34:11.010415 extend-filesystems[1414]: Found sr0 May 17 00:34:11.010555 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:34:11.010720 systemd[1]: Finished extend-filesystems.service. May 17 00:34:11.018339 systemd-logind[1425]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:34:11.018551 systemd-logind[1425]: New seat seat0. May 17 00:34:11.024740 env[1435]: time="2025-05-17T00:34:11.024699281Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:34:11.024858 env[1435]: time="2025-05-17T00:34:11.024842987Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:34:11.025189 env[1435]: time="2025-05-17T00:34:11.025165499Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:34:11.026186 env[1435]: time="2025-05-17T00:34:11.026160736Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:34:11.026288 env[1435]: time="2025-05-17T00:34:11.026269740Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:34:11.026366 env[1435]: time="2025-05-17T00:34:11.026351743Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:34:11.026544 env[1435]: time="2025-05-17T00:34:11.026526149Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:34:11.027610 env[1435]: time="2025-05-17T00:34:11.027586989Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:34:11.028633 env[1435]: time="2025-05-17T00:34:11.028605127Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:34:11.028733 env[1435]: time="2025-05-17T00:34:11.028717531Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:34:11.028855 env[1435]: time="2025-05-17T00:34:11.028836735Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:34:11.030445 env[1435]: time="2025-05-17T00:34:11.030421594Z" level=info msg="metadata content store policy set" policy=shared May 17 00:34:11.049463 env[1435]: time="2025-05-17T00:34:11.048790877Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:34:11.049463 env[1435]: time="2025-05-17T00:34:11.048831478Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:34:11.049463 env[1435]: time="2025-05-17T00:34:11.048849079Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:34:11.049463 env[1435]: time="2025-05-17T00:34:11.048883480Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:34:11.049463 env[1435]: time="2025-05-17T00:34:11.048900781Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:34:11.049463 env[1435]: time="2025-05-17T00:34:11.048919082Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:34:11.049463 env[1435]: time="2025-05-17T00:34:11.048939183Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:34:11.049463 env[1435]: time="2025-05-17T00:34:11.048958783Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:34:11.049463 env[1435]: time="2025-05-17T00:34:11.048977884Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:34:11.049463 env[1435]: time="2025-05-17T00:34:11.048995685Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:34:11.049463 env[1435]: time="2025-05-17T00:34:11.049013585Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:34:11.049463 env[1435]: time="2025-05-17T00:34:11.049030886Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:34:11.049463 env[1435]: time="2025-05-17T00:34:11.049141290Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:34:11.049463 env[1435]: time="2025-05-17T00:34:11.049225093Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:34:11.051559 env[1435]: time="2025-05-17T00:34:11.050309933Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:34:11.051559 env[1435]: time="2025-05-17T00:34:11.050351835Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:34:11.051559 env[1435]: time="2025-05-17T00:34:11.050384136Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:34:11.051559 env[1435]: time="2025-05-17T00:34:11.050470539Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:34:11.051559 env[1435]: time="2025-05-17T00:34:11.050489540Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:34:11.051559 env[1435]: time="2025-05-17T00:34:11.050507241Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:34:11.051559 env[1435]: time="2025-05-17T00:34:11.050524541Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:34:11.051559 env[1435]: time="2025-05-17T00:34:11.050552842Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:34:11.051559 env[1435]: time="2025-05-17T00:34:11.050570943Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:34:11.051559 env[1435]: time="2025-05-17T00:34:11.050585944Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:34:11.051559 env[1435]: time="2025-05-17T00:34:11.050603644Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:34:11.051559 env[1435]: time="2025-05-17T00:34:11.050631545Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:34:11.051559 env[1435]: time="2025-05-17T00:34:11.050801152Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:34:11.051559 env[1435]: time="2025-05-17T00:34:11.050822953Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:34:11.051559 env[1435]: time="2025-05-17T00:34:11.050840153Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:34:11.052113 env[1435]: time="2025-05-17T00:34:11.050868454Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:34:11.052113 env[1435]: time="2025-05-17T00:34:11.050888655Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:34:11.052113 env[1435]: time="2025-05-17T00:34:11.050904356Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:34:11.052113 env[1435]: time="2025-05-17T00:34:11.050936057Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:34:11.052113 env[1435]: time="2025-05-17T00:34:11.050976658Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:34:11.052299 env[1435]: time="2025-05-17T00:34:11.051326671Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:34:11.052299 env[1435]: time="2025-05-17T00:34:11.051429575Z" level=info msg="Connect containerd service" May 17 00:34:11.052299 env[1435]: time="2025-05-17T00:34:11.051494577Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:34:11.088843 env[1435]: time="2025-05-17T00:34:11.053159339Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:34:11.088843 env[1435]: time="2025-05-17T00:34:11.053521553Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:34:11.088843 env[1435]: time="2025-05-17T00:34:11.053585955Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:34:11.088843 env[1435]: time="2025-05-17T00:34:11.056008945Z" level=info msg="containerd successfully booted in 0.113692s" May 17 00:34:11.088843 env[1435]: time="2025-05-17T00:34:11.057507101Z" level=info msg="Start subscribing containerd event" May 17 00:34:11.088843 env[1435]: time="2025-05-17T00:34:11.057740210Z" level=info msg="Start recovering state" May 17 00:34:11.088843 env[1435]: time="2025-05-17T00:34:11.057899916Z" level=info msg="Start event monitor" May 17 00:34:11.088843 env[1435]: time="2025-05-17T00:34:11.057915616Z" level=info msg="Start snapshots syncer" May 17 00:34:11.088843 env[1435]: time="2025-05-17T00:34:11.057928717Z" level=info msg="Start cni network conf syncer for default" May 17 00:34:11.088843 env[1435]: time="2025-05-17T00:34:11.058031220Z" level=info msg="Start streaming server" May 17 00:34:11.053719 systemd[1]: Started containerd.service. May 17 00:34:11.102601 dbus-daemon[1412]: [system] SELinux support is enabled May 17 00:34:11.102790 systemd[1]: Started dbus.service. May 17 00:34:11.107506 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:34:11.107538 systemd[1]: Reached target system-config.target. May 17 00:34:11.109921 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:34:11.109942 systemd[1]: Reached target user-config.target. May 17 00:34:11.114640 systemd[1]: Started systemd-logind.service. May 17 00:34:11.117280 dbus-daemon[1412]: [system] Successfully activated service 'org.freedesktop.systemd1' May 17 00:34:11.169641 bash[1470]: Updated "/home/core/.ssh/authorized_keys" May 17 00:34:11.170181 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:34:11.251751 systemd[1]: nvidia.service: Deactivated successfully. May 17 00:34:11.932572 update_engine[1427]: I0517 00:34:11.931711 1427 main.cc:92] Flatcar Update Engine starting May 17 00:34:12.035066 systemd[1]: Started update-engine.service. May 17 00:34:12.039859 systemd[1]: Started locksmithd.service. May 17 00:34:12.042332 update_engine[1427]: I0517 00:34:12.042289 1427 update_check_scheduler.cc:74] Next update check in 9m9s May 17 00:34:12.065190 tar[1433]: linux-amd64/README.md May 17 00:34:12.072059 systemd[1]: Finished prepare-helm.service. May 17 00:34:12.327314 systemd[1]: Started kubelet.service. May 17 00:34:13.013598 kubelet[1524]: E0517 00:34:13.013550 1524 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:34:13.016506 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:34:13.016671 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:34:13.016940 systemd[1]: kubelet.service: Consumed 1.203s CPU time. May 17 00:34:13.165952 sshd_keygen[1434]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:34:13.185802 systemd[1]: Finished sshd-keygen.service. May 17 00:34:13.189575 systemd[1]: Starting issuegen.service... May 17 00:34:13.192720 systemd[1]: Started waagent.service. May 17 00:34:13.199252 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:34:13.199407 systemd[1]: Finished issuegen.service. May 17 00:34:13.203102 systemd[1]: Starting systemd-user-sessions.service... May 17 00:34:13.234385 systemd[1]: Finished systemd-user-sessions.service. May 17 00:34:13.238344 systemd[1]: Started getty@tty1.service. May 17 00:34:13.242116 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:34:13.244961 systemd[1]: Reached target getty.target. May 17 00:34:13.246982 systemd[1]: Reached target multi-user.target. May 17 00:34:13.250454 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:34:13.260227 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:34:13.260362 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:34:13.262916 systemd[1]: Startup finished in 974ms (firmware) + 33.354s (loader) + 897ms (kernel) + 13.944s (initrd) + 27.045s (userspace) = 1min 16.216s. May 17 00:34:13.805782 login[1548]: pam_lastlog(login:session): file /var/log/lastlog is locked/write May 17 00:34:13.813955 locksmithd[1520]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:34:13.821660 login[1547]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:34:13.860908 systemd[1]: Created slice user-500.slice. May 17 00:34:13.862383 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:34:13.866318 systemd-logind[1425]: New session 2 of user core. May 17 00:34:13.873343 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:34:13.875132 systemd[1]: Starting user@500.service... May 17 00:34:13.878718 (systemd)[1551]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:14.081372 systemd[1551]: Queued start job for default target default.target. May 17 00:34:14.081996 systemd[1551]: Reached target paths.target. May 17 00:34:14.082029 systemd[1551]: Reached target sockets.target. May 17 00:34:14.082046 systemd[1551]: Reached target timers.target. May 17 00:34:14.082063 systemd[1551]: Reached target basic.target. May 17 00:34:14.082190 systemd[1]: Started user@500.service. May 17 00:34:14.083439 systemd[1]: Started session-2.scope. May 17 00:34:14.083995 systemd[1551]: Reached target default.target. May 17 00:34:14.084190 systemd[1551]: Startup finished in 199ms. May 17 00:34:14.808427 login[1548]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 17 00:34:14.812350 systemd-logind[1425]: New session 1 of user core. May 17 00:34:14.813594 systemd[1]: Started session-1.scope. May 17 00:34:19.858340 waagent[1542]: 2025-05-17T00:34:19.858220Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 May 17 00:34:19.862865 waagent[1542]: 2025-05-17T00:34:19.862783Z INFO Daemon Daemon OS: flatcar 3510.3.7 May 17 00:34:19.864270 waagent[1542]: 2025-05-17T00:34:19.864206Z INFO Daemon Daemon Python: 3.9.16 May 17 00:34:19.865574 waagent[1542]: 2025-05-17T00:34:19.865511Z INFO Daemon Daemon Run daemon May 17 00:34:19.866913 waagent[1542]: 2025-05-17T00:34:19.866860Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.7' May 17 00:34:19.888752 waagent[1542]: 2025-05-17T00:34:19.882129Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 17 00:34:19.893756 waagent[1542]: 2025-05-17T00:34:19.890503Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 17 00:34:19.895184 waagent[1542]: 2025-05-17T00:34:19.895093Z INFO Daemon Daemon cloud-init is enabled: False May 17 00:34:19.905309 waagent[1542]: 2025-05-17T00:34:19.896380Z INFO Daemon Daemon Using waagent for provisioning May 17 00:34:19.905309 waagent[1542]: 2025-05-17T00:34:19.897784Z INFO Daemon Daemon Activate resource disk May 17 00:34:19.905309 waagent[1542]: 2025-05-17T00:34:19.898967Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb May 17 00:34:19.906645 waagent[1542]: 2025-05-17T00:34:19.906587Z INFO Daemon Daemon Found device: None May 17 00:34:19.921886 waagent[1542]: 2025-05-17T00:34:19.907900Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology May 17 00:34:19.921886 waagent[1542]: 2025-05-17T00:34:19.908746Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 May 17 00:34:19.921886 waagent[1542]: 2025-05-17T00:34:19.910427Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 17 00:34:19.921886 waagent[1542]: 2025-05-17T00:34:19.911554Z INFO Daemon Daemon Running default provisioning handler May 17 00:34:19.928792 waagent[1542]: 2025-05-17T00:34:19.928670Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 17 00:34:19.935503 waagent[1542]: 2025-05-17T00:34:19.935380Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 17 00:34:19.944102 waagent[1542]: 2025-05-17T00:34:19.936640Z INFO Daemon Daemon cloud-init is enabled: False May 17 00:34:19.944102 waagent[1542]: 2025-05-17T00:34:19.937381Z INFO Daemon Daemon Copying ovf-env.xml May 17 00:34:20.031553 waagent[1542]: 2025-05-17T00:34:20.028836Z INFO Daemon Daemon Successfully mounted dvd May 17 00:34:20.119365 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. May 17 00:34:20.145520 waagent[1542]: 2025-05-17T00:34:20.145331Z INFO Daemon Daemon Detect protocol endpoint May 17 00:34:20.148247 waagent[1542]: 2025-05-17T00:34:20.148153Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 17 00:34:20.151591 waagent[1542]: 2025-05-17T00:34:20.151510Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler May 17 00:34:20.154895 waagent[1542]: 2025-05-17T00:34:20.154824Z INFO Daemon Daemon Test for route to 168.63.129.16 May 17 00:34:20.157693 waagent[1542]: 2025-05-17T00:34:20.157631Z INFO Daemon Daemon Route to 168.63.129.16 exists May 17 00:34:20.160112 waagent[1542]: 2025-05-17T00:34:20.160049Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 May 17 00:34:20.281214 waagent[1542]: 2025-05-17T00:34:20.281133Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 May 17 00:34:20.289181 waagent[1542]: 2025-05-17T00:34:20.283068Z INFO Daemon Daemon Wire protocol version:2012-11-30 May 17 00:34:20.289181 waagent[1542]: 2025-05-17T00:34:20.284114Z INFO Daemon Daemon Server preferred version:2015-04-05 May 17 00:34:20.914054 waagent[1542]: 2025-05-17T00:34:20.913905Z INFO Daemon Daemon Initializing goal state during protocol detection May 17 00:34:20.924075 waagent[1542]: 2025-05-17T00:34:20.923999Z INFO Daemon Daemon Forcing an update of the goal state.. May 17 00:34:20.928990 waagent[1542]: 2025-05-17T00:34:20.925143Z INFO Daemon Daemon Fetching goal state [incarnation 1] May 17 00:34:21.002797 waagent[1542]: 2025-05-17T00:34:21.002647Z INFO Daemon Daemon Found private key matching thumbprint 0E8CD958E3B2F114419E54EE4CADE2A156EFCD8E May 17 00:34:21.007375 waagent[1542]: 2025-05-17T00:34:21.007288Z INFO Daemon Daemon Fetch goal state completed May 17 00:34:21.030154 waagent[1542]: 2025-05-17T00:34:21.030080Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 4264b911-b44c-491c-ac28-7edf7ea71ff8 New eTag: 13891545633057276219] May 17 00:34:21.035253 waagent[1542]: 2025-05-17T00:34:21.035185Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob May 17 00:34:21.046697 waagent[1542]: 2025-05-17T00:34:21.046631Z INFO Daemon Daemon Starting provisioning May 17 00:34:21.049540 waagent[1542]: 2025-05-17T00:34:21.049474Z INFO Daemon Daemon Handle ovf-env.xml. May 17 00:34:21.052565 waagent[1542]: 2025-05-17T00:34:21.052502Z INFO Daemon Daemon Set hostname [ci-3510.3.7-n-6a88388a60] May 17 00:34:21.075194 waagent[1542]: 2025-05-17T00:34:21.075033Z INFO Daemon Daemon Publish hostname [ci-3510.3.7-n-6a88388a60] May 17 00:34:21.078689 waagent[1542]: 2025-05-17T00:34:21.078589Z INFO Daemon Daemon Examine /proc/net/route for primary interface May 17 00:34:21.082076 waagent[1542]: 2025-05-17T00:34:21.081984Z INFO Daemon Daemon Primary interface is [eth0] May 17 00:34:21.096779 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. May 17 00:34:21.097029 systemd[1]: Stopped systemd-networkd-wait-online.service. May 17 00:34:21.097100 systemd[1]: Stopping systemd-networkd-wait-online.service... May 17 00:34:21.097452 systemd[1]: Stopping systemd-networkd.service... May 17 00:34:21.101447 systemd-networkd[1203]: eth0: DHCPv6 lease lost May 17 00:34:21.102997 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:34:21.103198 systemd[1]: Stopped systemd-networkd.service. May 17 00:34:21.105806 systemd[1]: Starting systemd-networkd.service... May 17 00:34:21.137019 systemd-networkd[1593]: enP60519s1: Link UP May 17 00:34:21.137030 systemd-networkd[1593]: enP60519s1: Gained carrier May 17 00:34:21.138342 systemd-networkd[1593]: eth0: Link UP May 17 00:34:21.138351 systemd-networkd[1593]: eth0: Gained carrier May 17 00:34:21.138796 systemd-networkd[1593]: lo: Link UP May 17 00:34:21.138804 systemd-networkd[1593]: lo: Gained carrier May 17 00:34:21.139111 systemd-networkd[1593]: eth0: Gained IPv6LL May 17 00:34:21.139384 systemd-networkd[1593]: Enumeration completed May 17 00:34:21.139845 systemd[1]: Started systemd-networkd.service. May 17 00:34:21.144476 waagent[1542]: 2025-05-17T00:34:21.141762Z INFO Daemon Daemon Create user account if not exists May 17 00:34:21.142137 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:34:21.150204 waagent[1542]: 2025-05-17T00:34:21.145147Z INFO Daemon Daemon User core already exists, skip useradd May 17 00:34:21.150204 waagent[1542]: 2025-05-17T00:34:21.148078Z INFO Daemon Daemon Configure sudoer May 17 00:34:21.154406 waagent[1542]: 2025-05-17T00:34:21.151503Z INFO Daemon Daemon Configure sshd May 17 00:34:21.154406 waagent[1542]: 2025-05-17T00:34:21.152741Z INFO Daemon Daemon Deploy ssh public key. May 17 00:34:21.151574 systemd-networkd[1593]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:34:21.196488 systemd-networkd[1593]: eth0: DHCPv4 address 10.200.4.40/24, gateway 10.200.4.1 acquired from 168.63.129.16 May 17 00:34:21.200662 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:34:22.261700 waagent[1542]: 2025-05-17T00:34:22.261582Z INFO Daemon Daemon Provisioning complete May 17 00:34:22.275859 waagent[1542]: 2025-05-17T00:34:22.275773Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping May 17 00:34:22.282934 waagent[1542]: 2025-05-17T00:34:22.277073Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. May 17 00:34:22.282934 waagent[1542]: 2025-05-17T00:34:22.278640Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent May 17 00:34:22.547019 waagent[1599]: 2025-05-17T00:34:22.546850Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent May 17 00:34:22.547774 waagent[1599]: 2025-05-17T00:34:22.547705Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:34:22.547916 waagent[1599]: 2025-05-17T00:34:22.547860Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:34:22.558824 waagent[1599]: 2025-05-17T00:34:22.558748Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. May 17 00:34:22.558984 waagent[1599]: 2025-05-17T00:34:22.558930Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] May 17 00:34:22.610694 waagent[1599]: 2025-05-17T00:34:22.610566Z INFO ExtHandler ExtHandler Found private key matching thumbprint 0E8CD958E3B2F114419E54EE4CADE2A156EFCD8E May 17 00:34:22.611020 waagent[1599]: 2025-05-17T00:34:22.610954Z INFO ExtHandler ExtHandler Fetch goal state completed May 17 00:34:22.624776 waagent[1599]: 2025-05-17T00:34:22.624712Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 765e4124-5776-4087-8b2d-948db3816e14 New eTag: 13891545633057276219] May 17 00:34:22.625262 waagent[1599]: 2025-05-17T00:34:22.625204Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob May 17 00:34:22.941233 waagent[1599]: 2025-05-17T00:34:22.941076Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; May 17 00:34:22.969270 waagent[1599]: 2025-05-17T00:34:22.969155Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1599 May 17 00:34:22.973617 waagent[1599]: 2025-05-17T00:34:22.973535Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 17 00:34:22.975094 waagent[1599]: 2025-05-17T00:34:22.975021Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules May 17 00:34:23.171223 waagent[1599]: 2025-05-17T00:34:23.171142Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 17 00:34:23.171747 waagent[1599]: 2025-05-17T00:34:23.171674Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 17 00:34:23.178849 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 00:34:23.179164 systemd[1]: Stopped kubelet.service. May 17 00:34:23.179227 systemd[1]: kubelet.service: Consumed 1.203s CPU time. May 17 00:34:23.180840 systemd[1]: Starting kubelet.service... May 17 00:34:23.185416 waagent[1599]: 2025-05-17T00:34:23.183227Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 17 00:34:23.185416 waagent[1599]: 2025-05-17T00:34:23.183840Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 17 00:34:23.185416 waagent[1599]: 2025-05-17T00:34:23.185229Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] May 17 00:34:23.190493 waagent[1599]: 2025-05-17T00:34:23.186968Z INFO ExtHandler ExtHandler Starting env monitor service. May 17 00:34:23.190493 waagent[1599]: 2025-05-17T00:34:23.187423Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:34:23.190493 waagent[1599]: 2025-05-17T00:34:23.187582Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:34:23.190493 waagent[1599]: 2025-05-17T00:34:23.188243Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 17 00:34:23.190493 waagent[1599]: 2025-05-17T00:34:23.188604Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 17 00:34:23.190493 waagent[1599]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 17 00:34:23.190493 waagent[1599]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 May 17 00:34:23.190493 waagent[1599]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 17 00:34:23.190493 waagent[1599]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 17 00:34:23.190493 waagent[1599]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:34:23.190493 waagent[1599]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:34:23.192011 waagent[1599]: 2025-05-17T00:34:23.191752Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 17 00:34:23.192990 waagent[1599]: 2025-05-17T00:34:23.192919Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:34:23.193540 waagent[1599]: 2025-05-17T00:34:23.193461Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:34:23.194264 waagent[1599]: 2025-05-17T00:34:23.194184Z INFO EnvHandler ExtHandler Configure routes May 17 00:34:23.194459 waagent[1599]: 2025-05-17T00:34:23.194368Z INFO EnvHandler ExtHandler Gateway:None May 17 00:34:23.194645 waagent[1599]: 2025-05-17T00:34:23.194564Z INFO EnvHandler ExtHandler Routes:None May 17 00:34:23.194809 waagent[1599]: 2025-05-17T00:34:23.194750Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 17 00:34:23.194985 waagent[1599]: 2025-05-17T00:34:23.194933Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 17 00:34:23.196586 waagent[1599]: 2025-05-17T00:34:23.196528Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 17 00:34:23.196775 waagent[1599]: 2025-05-17T00:34:23.196726Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 17 00:34:23.197063 waagent[1599]: 2025-05-17T00:34:23.197004Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 17 00:34:23.210372 waagent[1599]: 2025-05-17T00:34:23.210297Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) May 17 00:34:23.211398 waagent[1599]: 2025-05-17T00:34:23.211328Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 17 00:34:23.212441 waagent[1599]: 2025-05-17T00:34:23.212364Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' May 17 00:34:23.233602 waagent[1599]: 2025-05-17T00:34:23.233532Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. May 17 00:34:23.270915 waagent[1599]: 2025-05-17T00:34:23.270802Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1593' May 17 00:34:23.787789 waagent[1599]: 2025-05-17T00:34:23.787713Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.13.1.1 -- exiting May 17 00:34:23.846166 systemd[1]: Started kubelet.service. May 17 00:34:23.969897 kubelet[1630]: E0517 00:34:23.969752 1630 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:34:23.972858 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:34:23.973015 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:34:24.282927 waagent[1542]: 2025-05-17T00:34:24.282746Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running May 17 00:34:24.287517 waagent[1542]: 2025-05-17T00:34:24.287453Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.13.1.1 to be the latest agent May 17 00:34:25.382969 waagent[1635]: 2025-05-17T00:34:25.382856Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.13.1.1) May 17 00:34:25.384249 waagent[1635]: 2025-05-17T00:34:25.384180Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.7 May 17 00:34:25.384401 waagent[1635]: 2025-05-17T00:34:25.384338Z INFO ExtHandler ExtHandler Python: 3.9.16 May 17 00:34:25.384568 waagent[1635]: 2025-05-17T00:34:25.384519Z INFO ExtHandler ExtHandler CPU Arch: x86_64 May 17 00:34:25.399796 waagent[1635]: 2025-05-17T00:34:25.399690Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; May 17 00:34:25.400196 waagent[1635]: 2025-05-17T00:34:25.400136Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:34:25.400356 waagent[1635]: 2025-05-17T00:34:25.400309Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:34:25.400601 waagent[1635]: 2025-05-17T00:34:25.400551Z INFO ExtHandler ExtHandler Initializing the goal state... May 17 00:34:25.412283 waagent[1635]: 2025-05-17T00:34:25.412208Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] May 17 00:34:25.419956 waagent[1635]: 2025-05-17T00:34:25.419897Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.166 May 17 00:34:25.420856 waagent[1635]: 2025-05-17T00:34:25.420797Z INFO ExtHandler May 17 00:34:25.421002 waagent[1635]: 2025-05-17T00:34:25.420953Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 12214812-db73-4b38-b84f-977db59a5c04 eTag: 13891545633057276219 source: Fabric] May 17 00:34:25.421706 waagent[1635]: 2025-05-17T00:34:25.421648Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. May 17 00:34:25.422786 waagent[1635]: 2025-05-17T00:34:25.422726Z INFO ExtHandler May 17 00:34:25.422921 waagent[1635]: 2025-05-17T00:34:25.422868Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] May 17 00:34:25.428819 waagent[1635]: 2025-05-17T00:34:25.428768Z INFO ExtHandler ExtHandler Downloading artifacts profile blob May 17 00:34:25.429220 waagent[1635]: 2025-05-17T00:34:25.429174Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 17 00:34:25.445760 waagent[1635]: 2025-05-17T00:34:25.445703Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. May 17 00:34:25.499195 waagent[1635]: 2025-05-17T00:34:25.499071Z INFO ExtHandler Downloaded certificate {'thumbprint': '0E8CD958E3B2F114419E54EE4CADE2A156EFCD8E', 'hasPrivateKey': True} May 17 00:34:25.500410 waagent[1635]: 2025-05-17T00:34:25.500326Z INFO ExtHandler Fetch goal state from WireServer completed May 17 00:34:25.501214 waagent[1635]: 2025-05-17T00:34:25.501154Z INFO ExtHandler ExtHandler Goal state initialization completed. May 17 00:34:25.518071 waagent[1635]: 2025-05-17T00:34:25.517972Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) May 17 00:34:25.525866 waagent[1635]: 2025-05-17T00:34:25.525774Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 17 00:34:25.529234 waagent[1635]: 2025-05-17T00:34:25.529137Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] May 17 00:34:25.529473 waagent[1635]: 2025-05-17T00:34:25.529418Z INFO ExtHandler ExtHandler Checking state of the firewall May 17 00:34:25.695961 waagent[1635]: 2025-05-17T00:34:25.695837Z INFO ExtHandler ExtHandler Created firewall rules for Azure Fabric: May 17 00:34:25.695961 waagent[1635]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:34:25.695961 waagent[1635]: pkts bytes target prot opt in out source destination May 17 00:34:25.695961 waagent[1635]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 17 00:34:25.695961 waagent[1635]: pkts bytes target prot opt in out source destination May 17 00:34:25.695961 waagent[1635]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 17 00:34:25.695961 waagent[1635]: pkts bytes target prot opt in out source destination May 17 00:34:25.695961 waagent[1635]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 May 17 00:34:25.695961 waagent[1635]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 17 00:34:25.695961 waagent[1635]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 17 00:34:25.697094 waagent[1635]: 2025-05-17T00:34:25.697021Z INFO ExtHandler ExtHandler Setting up persistent firewall rules May 17 00:34:25.699761 waagent[1635]: 2025-05-17T00:34:25.699659Z INFO ExtHandler ExtHandler The firewalld service is not present on the system May 17 00:34:25.700007 waagent[1635]: 2025-05-17T00:34:25.699955Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 17 00:34:25.700339 waagent[1635]: 2025-05-17T00:34:25.700285Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 17 00:34:25.708155 waagent[1635]: 2025-05-17T00:34:25.708101Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 17 00:34:25.708653 waagent[1635]: 2025-05-17T00:34:25.708594Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 17 00:34:25.715941 waagent[1635]: 2025-05-17T00:34:25.715861Z INFO ExtHandler ExtHandler WALinuxAgent-2.13.1.1 running as process 1635 May 17 00:34:25.718919 waagent[1635]: 2025-05-17T00:34:25.718852Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 17 00:34:25.719725 waagent[1635]: 2025-05-17T00:34:25.719664Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled May 17 00:34:25.720582 waagent[1635]: 2025-05-17T00:34:25.720525Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False May 17 00:34:25.723028 waagent[1635]: 2025-05-17T00:34:25.722966Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] May 17 00:34:25.724306 waagent[1635]: 2025-05-17T00:34:25.724247Z INFO ExtHandler ExtHandler Starting env monitor service. May 17 00:34:25.724770 waagent[1635]: 2025-05-17T00:34:25.724715Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:34:25.724922 waagent[1635]: 2025-05-17T00:34:25.724875Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:34:25.725475 waagent[1635]: 2025-05-17T00:34:25.725380Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 17 00:34:25.725899 waagent[1635]: 2025-05-17T00:34:25.725841Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 17 00:34:25.726428 waagent[1635]: 2025-05-17T00:34:25.726357Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 17 00:34:25.726685 waagent[1635]: 2025-05-17T00:34:25.726630Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 17 00:34:25.726685 waagent[1635]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 17 00:34:25.726685 waagent[1635]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 May 17 00:34:25.726685 waagent[1635]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 17 00:34:25.726685 waagent[1635]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 17 00:34:25.726685 waagent[1635]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:34:25.726685 waagent[1635]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 17 00:34:25.727453 waagent[1635]: 2025-05-17T00:34:25.727385Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 17 00:34:25.727881 waagent[1635]: 2025-05-17T00:34:25.727826Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 17 00:34:25.731179 waagent[1635]: 2025-05-17T00:34:25.731069Z INFO EnvHandler ExtHandler Configure routes May 17 00:34:25.731680 waagent[1635]: 2025-05-17T00:34:25.731600Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 17 00:34:25.732527 waagent[1635]: 2025-05-17T00:34:25.732462Z INFO EnvHandler ExtHandler Gateway:None May 17 00:34:25.732903 waagent[1635]: 2025-05-17T00:34:25.732846Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 17 00:34:25.733288 waagent[1635]: 2025-05-17T00:34:25.733234Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 17 00:34:25.733726 waagent[1635]: 2025-05-17T00:34:25.733674Z INFO EnvHandler ExtHandler Routes:None May 17 00:34:25.734462 waagent[1635]: 2025-05-17T00:34:25.734410Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 17 00:34:25.751712 waagent[1635]: 2025-05-17T00:34:25.751617Z INFO ExtHandler ExtHandler Downloading agent manifest May 17 00:34:25.766755 waagent[1635]: 2025-05-17T00:34:25.766670Z INFO MonitorHandler ExtHandler Network interfaces: May 17 00:34:25.766755 waagent[1635]: Executing ['ip', '-a', '-o', 'link']: May 17 00:34:25.766755 waagent[1635]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 17 00:34:25.766755 waagent[1635]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:02:d7:3c brd ff:ff:ff:ff:ff:ff May 17 00:34:25.766755 waagent[1635]: 3: enP60519s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:02:d7:3c brd ff:ff:ff:ff:ff:ff\ altname enP60519p0s2 May 17 00:34:25.766755 waagent[1635]: Executing ['ip', '-4', '-a', '-o', 'address']: May 17 00:34:25.766755 waagent[1635]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 17 00:34:25.766755 waagent[1635]: 2: eth0 inet 10.200.4.40/24 metric 1024 brd 10.200.4.255 scope global eth0\ valid_lft forever preferred_lft forever May 17 00:34:25.766755 waagent[1635]: Executing ['ip', '-6', '-a', '-o', 'address']: May 17 00:34:25.766755 waagent[1635]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 17 00:34:25.766755 waagent[1635]: 2: eth0 inet6 fe80::7e1e:52ff:fe02:d73c/64 scope link \ valid_lft forever preferred_lft forever May 17 00:34:25.777031 waagent[1635]: 2025-05-17T00:34:25.776944Z INFO ExtHandler ExtHandler May 17 00:34:25.778096 waagent[1635]: 2025-05-17T00:34:25.778035Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 07cc1ce8-4cdf-4bc1-8b7d-4d24c4d8a3b4 correlation e2944afe-9a77-4da4-903f-2455c555dbc7 created: 2025-05-17T00:32:44.038910Z] May 17 00:34:25.781437 waagent[1635]: 2025-05-17T00:34:25.781363Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. May 17 00:34:25.784479 waagent[1635]: 2025-05-17T00:34:25.784412Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 7 ms] May 17 00:34:25.801026 waagent[1635]: 2025-05-17T00:34:25.800944Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 17 00:34:25.810837 waagent[1635]: 2025-05-17T00:34:25.810750Z INFO ExtHandler ExtHandler Looking for existing remote access users. May 17 00:34:25.819631 waagent[1635]: 2025-05-17T00:34:25.819564Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.13.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: A98A0D06-20BE-4ADA-957D-B09C959F5C07;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] May 17 00:34:25.819792 waagent[1635]: 2025-05-17T00:34:25.819733Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 May 17 00:34:31.105078 systemd[1]: Created slice system-sshd.slice. May 17 00:34:31.106924 systemd[1]: Started sshd@0-10.200.4.40:22-10.200.16.10:48500.service. May 17 00:34:31.925882 sshd[1677]: Accepted publickey for core from 10.200.16.10 port 48500 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:34:31.927600 sshd[1677]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:31.931929 systemd-logind[1425]: New session 3 of user core. May 17 00:34:31.933258 systemd[1]: Started session-3.scope. May 17 00:34:32.442849 systemd[1]: Started sshd@1-10.200.4.40:22-10.200.16.10:48510.service. May 17 00:34:33.024740 sshd[1682]: Accepted publickey for core from 10.200.16.10 port 48510 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:34:33.026421 sshd[1682]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:33.032050 systemd[1]: Started session-4.scope. May 17 00:34:33.032807 systemd-logind[1425]: New session 4 of user core. May 17 00:34:33.452536 sshd[1682]: pam_unix(sshd:session): session closed for user core May 17 00:34:33.455778 systemd[1]: sshd@1-10.200.4.40:22-10.200.16.10:48510.service: Deactivated successfully. May 17 00:34:33.456821 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:34:33.457634 systemd-logind[1425]: Session 4 logged out. Waiting for processes to exit. May 17 00:34:33.458557 systemd-logind[1425]: Removed session 4. May 17 00:34:33.551981 systemd[1]: Started sshd@2-10.200.4.40:22-10.200.16.10:48518.service. May 17 00:34:34.039198 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 17 00:34:34.039617 systemd[1]: Stopped kubelet.service. May 17 00:34:34.041714 systemd[1]: Starting kubelet.service... May 17 00:34:34.142033 sshd[1688]: Accepted publickey for core from 10.200.16.10 port 48518 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:34:34.143718 sshd[1688]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:34.148749 systemd[1]: Started session-5.scope. May 17 00:34:34.149789 systemd-logind[1425]: New session 5 of user core. May 17 00:34:34.390563 systemd[1]: Started kubelet.service. May 17 00:34:34.568706 sshd[1688]: pam_unix(sshd:session): session closed for user core May 17 00:34:34.571972 systemd[1]: sshd@2-10.200.4.40:22-10.200.16.10:48518.service: Deactivated successfully. May 17 00:34:34.573005 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:34:34.573821 systemd-logind[1425]: Session 5 logged out. Waiting for processes to exit. May 17 00:34:34.574724 systemd-logind[1425]: Removed session 5. May 17 00:34:34.667538 systemd[1]: Started sshd@3-10.200.4.40:22-10.200.16.10:48520.service. May 17 00:34:34.825898 kubelet[1695]: E0517 00:34:34.825845 1695 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:34:34.827669 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:34:34.827831 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:34:35.254218 sshd[1703]: Accepted publickey for core from 10.200.16.10 port 48520 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:34:35.255692 sshd[1703]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:35.260690 systemd[1]: Started session-6.scope. May 17 00:34:35.261154 systemd-logind[1425]: New session 6 of user core. May 17 00:34:35.681560 sshd[1703]: pam_unix(sshd:session): session closed for user core May 17 00:34:35.684925 systemd[1]: sshd@3-10.200.4.40:22-10.200.16.10:48520.service: Deactivated successfully. May 17 00:34:35.685931 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:34:35.686699 systemd-logind[1425]: Session 6 logged out. Waiting for processes to exit. May 17 00:34:35.687606 systemd-logind[1425]: Removed session 6. May 17 00:34:35.786436 systemd[1]: Started sshd@4-10.200.4.40:22-10.200.16.10:48528.service. May 17 00:34:36.370793 sshd[1709]: Accepted publickey for core from 10.200.16.10 port 48528 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:34:36.372480 sshd[1709]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:36.377783 systemd[1]: Started session-7.scope. May 17 00:34:36.378217 systemd-logind[1425]: New session 7 of user core. May 17 00:34:37.271706 sudo[1712]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:34:37.272084 sudo[1712]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:34:37.295591 dbus-daemon[1412]: ЍFIKV: received setenforce notice (enforcing=-2132119040) May 17 00:34:37.297457 sudo[1712]: pam_unix(sudo:session): session closed for user root May 17 00:34:37.413630 sshd[1709]: pam_unix(sshd:session): session closed for user core May 17 00:34:37.417232 systemd[1]: sshd@4-10.200.4.40:22-10.200.16.10:48528.service: Deactivated successfully. May 17 00:34:37.418287 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:34:37.418933 systemd-logind[1425]: Session 7 logged out. Waiting for processes to exit. May 17 00:34:37.419805 systemd-logind[1425]: Removed session 7. May 17 00:34:37.512937 systemd[1]: Started sshd@5-10.200.4.40:22-10.200.16.10:48544.service. May 17 00:34:38.101766 sshd[1716]: Accepted publickey for core from 10.200.16.10 port 48544 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:34:38.104675 sshd[1716]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:38.110372 systemd[1]: Started session-8.scope. May 17 00:34:38.111109 systemd-logind[1425]: New session 8 of user core. May 17 00:34:38.430086 sudo[1720]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:34:38.430681 sudo[1720]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:34:38.433346 sudo[1720]: pam_unix(sudo:session): session closed for user root May 17 00:34:38.437936 sudo[1719]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:34:38.438216 sudo[1719]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:34:38.446848 systemd[1]: Stopping audit-rules.service... May 17 00:34:38.446000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:34:38.448547 auditctl[1723]: No rules May 17 00:34:38.451773 kernel: kauditd_printk_skb: 3 callbacks suppressed May 17 00:34:38.451847 kernel: audit: type=1305 audit(1747442078.446:218): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:34:38.448947 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:34:38.449097 systemd[1]: Stopped audit-rules.service. May 17 00:34:38.451150 systemd[1]: Starting audit-rules.service... May 17 00:34:38.471590 kernel: audit: type=1300 audit(1747442078.446:218): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdab91f480 a2=420 a3=0 items=0 ppid=1 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:38.446000 audit[1723]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdab91f480 a2=420 a3=0 items=0 ppid=1 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:38.446000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:34:38.474489 augenrules[1740]: No rules May 17 00:34:38.476030 kernel: audit: type=1327 audit(1747442078.446:218): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:34:38.476318 systemd[1]: Finished audit-rules.service. May 17 00:34:38.477537 sudo[1719]: pam_unix(sudo:session): session closed for user root May 17 00:34:38.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:38.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:38.501260 kernel: audit: type=1131 audit(1747442078.446:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:38.501321 kernel: audit: type=1130 audit(1747442078.475:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:38.501460 kernel: audit: type=1106 audit(1747442078.476:221): pid=1719 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:38.476000 audit[1719]: USER_END pid=1719 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:38.476000 audit[1719]: CRED_DISP pid=1719 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:38.524931 kernel: audit: type=1104 audit(1747442078.476:222): pid=1719 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:38.581531 sshd[1716]: pam_unix(sshd:session): session closed for user core May 17 00:34:38.581000 audit[1716]: USER_END pid=1716 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:34:38.585130 systemd[1]: sshd@5-10.200.4.40:22-10.200.16.10:48544.service: Deactivated successfully. May 17 00:34:38.585968 systemd[1]: session-8.scope: Deactivated successfully. May 17 00:34:38.587370 systemd-logind[1425]: Session 8 logged out. Waiting for processes to exit. May 17 00:34:38.588654 systemd-logind[1425]: Removed session 8. May 17 00:34:38.581000 audit[1716]: CRED_DISP pid=1716 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:34:38.611372 kernel: audit: type=1106 audit(1747442078.581:223): pid=1716 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:34:38.611439 kernel: audit: type=1104 audit(1747442078.581:224): pid=1716 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:34:38.611468 kernel: audit: type=1131 audit(1747442078.581:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.40:22-10.200.16.10:48544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:38.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.40:22-10.200.16.10:48544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:38.680781 systemd[1]: Started sshd@6-10.200.4.40:22-10.200.16.10:35810.service. May 17 00:34:38.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.40:22-10.200.16.10:35810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:39.266000 audit[1746]: USER_ACCT pid=1746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:34:39.268693 sshd[1746]: Accepted publickey for core from 10.200.16.10 port 35810 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:34:39.268000 audit[1746]: CRED_ACQ pid=1746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:34:39.268000 audit[1746]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1e1af060 a2=3 a3=0 items=0 ppid=1 pid=1746 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.268000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:39.270299 sshd[1746]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:39.275685 systemd[1]: Started session-9.scope. May 17 00:34:39.276254 systemd-logind[1425]: New session 9 of user core. May 17 00:34:39.278000 audit[1746]: USER_START pid=1746 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:34:39.280000 audit[1748]: CRED_ACQ pid=1748 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:34:39.593000 audit[1749]: USER_ACCT pid=1749 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:39.593000 audit[1749]: CRED_REFR pid=1749 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:39.595029 sudo[1749]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:34:39.595360 sudo[1749]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:34:39.595000 audit[1749]: USER_START pid=1749 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:34:39.635118 systemd[1]: Starting docker.service... May 17 00:34:39.675197 env[1759]: time="2025-05-17T00:34:39.675156227Z" level=info msg="Starting up" May 17 00:34:39.676732 env[1759]: time="2025-05-17T00:34:39.676708737Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:34:39.676846 env[1759]: time="2025-05-17T00:34:39.676833838Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:34:39.676903 env[1759]: time="2025-05-17T00:34:39.676891838Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:34:39.676952 env[1759]: time="2025-05-17T00:34:39.676944738Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:34:39.678744 env[1759]: time="2025-05-17T00:34:39.678725449Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:34:39.678846 env[1759]: time="2025-05-17T00:34:39.678835550Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:34:39.678914 env[1759]: time="2025-05-17T00:34:39.678893850Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:34:39.678968 env[1759]: time="2025-05-17T00:34:39.678959851Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:34:39.780172 env[1759]: time="2025-05-17T00:34:39.780123868Z" level=info msg="Loading containers: start." May 17 00:34:39.838000 audit[1787]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:39.838000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe8803e490 a2=0 a3=7ffe8803e47c items=0 ppid=1759 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.838000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 17 00:34:39.840000 audit[1789]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:39.840000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff1858ce70 a2=0 a3=7fff1858ce5c items=0 ppid=1759 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.840000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 17 00:34:39.842000 audit[1791]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:39.842000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe9508e570 a2=0 a3=7ffe9508e55c items=0 ppid=1759 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.842000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:34:39.844000 audit[1793]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:39.844000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc466aff20 a2=0 a3=7ffc466aff0c items=0 ppid=1759 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.844000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:34:39.846000 audit[1795]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1795 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:39.846000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdd5c31fd0 a2=0 a3=7ffdd5c31fbc items=0 ppid=1759 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.846000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 17 00:34:39.848000 audit[1797]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:39.848000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd359534e0 a2=0 a3=7ffd359534cc items=0 ppid=1759 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.848000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 17 00:34:39.864000 audit[1799]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:39.864000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffecd1b0e20 a2=0 a3=7ffecd1b0e0c items=0 ppid=1759 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.864000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 17 00:34:39.866000 audit[1801]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1801 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:39.866000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffdfa944b50 a2=0 a3=7ffdfa944b3c items=0 ppid=1759 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.866000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 17 00:34:39.868000 audit[1803]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:39.868000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffce86ecaa0 a2=0 a3=7ffce86eca8c items=0 ppid=1759 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.868000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:34:39.884000 audit[1807]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:39.884000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffa5756870 a2=0 a3=7fffa575685c items=0 ppid=1759 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.884000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:34:39.888000 audit[1808]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:39.888000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff8095c950 a2=0 a3=7fff8095c93c items=0 ppid=1759 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:39.888000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:34:39.929413 kernel: Initializing XFRM netlink socket May 17 00:34:39.956713 env[1759]: time="2025-05-17T00:34:39.956664245Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 17 00:34:40.144000 audit[1816]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:40.144000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd906e7e70 a2=0 a3=7ffd906e7e5c items=0 ppid=1759 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.144000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 17 00:34:40.183000 audit[1819]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1819 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:40.183000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffdbc2e9850 a2=0 a3=7ffdbc2e983c items=0 ppid=1759 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.183000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 17 00:34:40.187000 audit[1822]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1822 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:40.187000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe137dbb50 a2=0 a3=7ffe137dbb3c items=0 ppid=1759 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.187000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 17 00:34:40.189000 audit[1824]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:40.189000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe75c2f660 a2=0 a3=7ffe75c2f64c items=0 ppid=1759 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.189000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 17 00:34:40.191000 audit[1826]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:40.191000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc95af9250 a2=0 a3=7ffc95af923c items=0 ppid=1759 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.191000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 17 00:34:40.193000 audit[1828]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:40.193000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffde3eae250 a2=0 a3=7ffde3eae23c items=0 ppid=1759 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.193000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 17 00:34:40.195000 audit[1830]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1830 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:40.195000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffd8101910 a2=0 a3=7fffd81018fc items=0 ppid=1759 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.195000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 17 00:34:40.197000 audit[1832]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:40.197000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe14284e10 a2=0 a3=7ffe14284dfc items=0 ppid=1759 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.197000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 17 00:34:40.199000 audit[1834]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1834 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:40.199000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffdf7dcfc40 a2=0 a3=7ffdf7dcfc2c items=0 ppid=1759 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.199000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:34:40.201000 audit[1836]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:40.201000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffcd70a8df0 a2=0 a3=7ffcd70a8ddc items=0 ppid=1759 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.201000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:34:40.202000 audit[1838]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1838 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:40.202000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe2b01a0c0 a2=0 a3=7ffe2b01a0ac items=0 ppid=1759 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.202000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 17 00:34:40.204809 systemd-networkd[1593]: docker0: Link UP May 17 00:34:40.249000 audit[1842]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1842 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:40.249000 audit[1842]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd2c806e30 a2=0 a3=7ffd2c806e1c items=0 ppid=1759 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.249000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:34:40.254000 audit[1843]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1843 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:34:40.254000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd5e7bc550 a2=0 a3=7ffd5e7bc53c items=0 ppid=1759 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.254000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:34:40.256041 env[1759]: time="2025-05-17T00:34:40.255994385Z" level=info msg="Loading containers: done." May 17 00:34:40.267694 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3514655917-merged.mount: Deactivated successfully. May 17 00:34:40.299981 env[1759]: time="2025-05-17T00:34:40.299935136Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 17 00:34:40.300193 env[1759]: time="2025-05-17T00:34:40.300175137Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 17 00:34:40.300317 env[1759]: time="2025-05-17T00:34:40.300294438Z" level=info msg="Daemon has completed initialization" May 17 00:34:40.330971 systemd[1]: Started docker.service. May 17 00:34:40.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:40.341751 env[1759]: time="2025-05-17T00:34:40.341700575Z" level=info msg="API listen on /run/docker.sock" May 17 00:34:42.222274 env[1435]: time="2025-05-17T00:34:42.222222523Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.1\"" May 17 00:34:43.039038 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1165343964.mount: Deactivated successfully. May 17 00:34:44.920836 env[1435]: time="2025-05-17T00:34:44.920772418Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:44.930075 env[1435]: time="2025-05-17T00:34:44.930019858Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c6ab243b29f82a6ce269a5342bfd9ea3d0d4ef0f2bb7e98c6ac0bde1aeafab66,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:44.933499 env[1435]: time="2025-05-17T00:34:44.933463974Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:44.937795 env[1435]: time="2025-05-17T00:34:44.937761793Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:d8ae2fb01c39aa1c7add84f3d54425cf081c24c11e3946830292a8cfa4293548,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:44.937945 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 17 00:34:44.938222 systemd[1]: Stopped kubelet.service. May 17 00:34:44.938729 env[1435]: time="2025-05-17T00:34:44.938697897Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.1\" returns image reference \"sha256:c6ab243b29f82a6ce269a5342bfd9ea3d0d4ef0f2bb7e98c6ac0bde1aeafab66\"" May 17 00:34:44.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:44.952485 kernel: kauditd_printk_skb: 84 callbacks suppressed May 17 00:34:44.952589 kernel: audit: type=1130 audit(1747442084.936:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:44.942711 systemd[1]: Starting kubelet.service... May 17 00:34:44.952728 env[1435]: time="2025-05-17T00:34:44.943704019Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.1\"" May 17 00:34:44.958405 kernel: audit: type=1131 audit(1747442084.936:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:44.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:45.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:45.049499 systemd[1]: Started kubelet.service. May 17 00:34:45.060410 kernel: audit: type=1130 audit(1747442085.048:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:45.703921 kubelet[1879]: E0517 00:34:45.703868 1879 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:34:45.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:34:45.705670 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:34:45.705785 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:34:45.718420 kernel: audit: type=1131 audit(1747442085.704:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:34:47.411601 env[1435]: time="2025-05-17T00:34:47.411544495Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:47.417775 env[1435]: time="2025-05-17T00:34:47.417735817Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef43894fa110c389f7286f4d5a3ea176072c95280efeca60d6a79617cdbbf3e4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:47.421973 env[1435]: time="2025-05-17T00:34:47.421943533Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:47.426627 env[1435]: time="2025-05-17T00:34:47.426537049Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:7c9bea694e3a3c01ed6a5ee02d55a6124cc08e0b2eec6caa33f2c396b8cbc3f8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:47.427772 env[1435]: time="2025-05-17T00:34:47.427735254Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.1\" returns image reference \"sha256:ef43894fa110c389f7286f4d5a3ea176072c95280efeca60d6a79617cdbbf3e4\"" May 17 00:34:47.428835 env[1435]: time="2025-05-17T00:34:47.428803258Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.1\"" May 17 00:34:49.041017 env[1435]: time="2025-05-17T00:34:49.040959082Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:49.050224 env[1435]: time="2025-05-17T00:34:49.050180812Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:398c985c0d950becc8dcdab5877a8a517ffeafca0792b3fe5f1acff218aeac49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:49.055160 env[1435]: time="2025-05-17T00:34:49.055124928Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:49.061055 env[1435]: time="2025-05-17T00:34:49.061020247Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:395b7de7cdbdcc3c3a3db270844a3f71d757e2447a1e4db76b4cce46fba7fd55,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:49.061797 env[1435]: time="2025-05-17T00:34:49.061756649Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.1\" returns image reference \"sha256:398c985c0d950becc8dcdab5877a8a517ffeafca0792b3fe5f1acff218aeac49\"" May 17 00:34:49.062509 env[1435]: time="2025-05-17T00:34:49.062479951Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\"" May 17 00:34:49.910412 kernel: hv_balloon: Max. dynamic memory size: 8192 MB May 17 00:34:50.652992 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2464197023.mount: Deactivated successfully. May 17 00:34:51.337405 env[1435]: time="2025-05-17T00:34:51.337339108Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:51.345698 env[1435]: time="2025-05-17T00:34:51.345654332Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b79c189b052cdbe0e837d0caa6faf1d9fd696d8664fcc462f67d9ea51f26fef2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:51.351742 env[1435]: time="2025-05-17T00:34:51.351701849Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:51.356008 env[1435]: time="2025-05-17T00:34:51.355972761Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:7ddf379897139ae8ade8b33cb9373b70c632a4d5491da6e234f5d830e0a50807,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:51.356385 env[1435]: time="2025-05-17T00:34:51.356353562Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\" returns image reference \"sha256:b79c189b052cdbe0e837d0caa6faf1d9fd696d8664fcc462f67d9ea51f26fef2\"" May 17 00:34:51.357051 env[1435]: time="2025-05-17T00:34:51.357027164Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\"" May 17 00:34:51.995710 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3757520249.mount: Deactivated successfully. May 17 00:34:53.515746 env[1435]: time="2025-05-17T00:34:53.515689884Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:53.525038 env[1435]: time="2025-05-17T00:34:53.524990507Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:53.529214 env[1435]: time="2025-05-17T00:34:53.529178218Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:53.535914 env[1435]: time="2025-05-17T00:34:53.535870634Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:40384aa1f5ea6bfdc77997d243aec73da05f27aed0c5e9d65bfa98933c519d97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:53.536614 env[1435]: time="2025-05-17T00:34:53.536577636Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\" returns image reference \"sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b\"" May 17 00:34:53.537258 env[1435]: time="2025-05-17T00:34:53.537230138Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 17 00:34:54.198629 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2562561055.mount: Deactivated successfully. May 17 00:34:54.220432 env[1435]: time="2025-05-17T00:34:54.220367793Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:54.228596 env[1435]: time="2025-05-17T00:34:54.228545612Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:54.232174 env[1435]: time="2025-05-17T00:34:54.232137720Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:54.236398 env[1435]: time="2025-05-17T00:34:54.236352830Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:54.236838 env[1435]: time="2025-05-17T00:34:54.236805031Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 17 00:34:54.237675 env[1435]: time="2025-05-17T00:34:54.237648033Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\"" May 17 00:34:55.953561 kernel: audit: type=1130 audit(1747442095.936:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:55.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:55.937903 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 17 00:34:55.938166 systemd[1]: Stopped kubelet.service. May 17 00:34:55.953224 systemd[1]: Starting kubelet.service... May 17 00:34:55.971101 kernel: audit: type=1131 audit(1747442095.936:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:55.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:56.115607 kernel: audit: type=1130 audit(1747442096.100:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:56.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:56.101073 systemd[1]: Started kubelet.service. May 17 00:34:56.733975 kubelet[1889]: E0517 00:34:56.733930 1889 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:34:56.736235 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:34:56.736408 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:34:56.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:34:56.751421 kernel: audit: type=1131 audit(1747442096.735:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:34:57.317585 env[1435]: time="2025-05-17T00:34:57.317528816Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:57.324848 env[1435]: time="2025-05-17T00:34:57.324808230Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:57.328258 env[1435]: time="2025-05-17T00:34:57.328223637Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:57.334351 env[1435]: time="2025-05-17T00:34:57.334321648Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:d58c035df557080a27387d687092e3fc2b64c6d0e3162dc51453a115f847d121,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:57.335071 env[1435]: time="2025-05-17T00:34:57.335039350Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\" returns image reference \"sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1\"" May 17 00:34:57.394087 update_engine[1427]: I0517 00:34:57.393446 1427 update_attempter.cc:509] Updating boot flags... May 17 00:35:01.245239 systemd[1]: Stopped kubelet.service. May 17 00:35:01.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:01.259553 kernel: audit: type=1130 audit(1747442101.244:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:01.250710 systemd[1]: Starting kubelet.service... May 17 00:35:01.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:01.279480 kernel: audit: type=1131 audit(1747442101.247:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:01.311778 systemd[1]: Reloading. May 17 00:35:01.426036 /usr/lib/systemd/system-generators/torcx-generator[1978]: time="2025-05-17T00:35:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:35:01.427218 /usr/lib/systemd/system-generators/torcx-generator[1978]: time="2025-05-17T00:35:01Z" level=info msg="torcx already run" May 17 00:35:01.514105 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:35:01.514125 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:35:01.530732 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:35:01.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.618419 kernel: audit: type=1400 audit(1747442101.603:270): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.643704 kernel: audit: type=1400 audit(1747442101.603:271): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.643807 kernel: audit: type=1400 audit(1747442101.603:272): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.656533 kernel: audit: type=1400 audit(1747442101.603:273): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.670416 kernel: audit: type=1400 audit(1747442101.603:274): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.670514 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:35:01.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.687643 kernel: audit: type=1400 audit(1747442101.603:275): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.687730 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:35:01.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.616000 audit: BPF prog-id=47 op=LOAD May 17 00:35:01.616000 audit: BPF prog-id=40 op=UNLOAD May 17 00:35:01.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.629000 audit: BPF prog-id=48 op=LOAD May 17 00:35:01.629000 audit: BPF prog-id=41 op=UNLOAD May 17 00:35:01.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.642000 audit: BPF prog-id=49 op=LOAD May 17 00:35:01.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.642000 audit: BPF prog-id=50 op=LOAD May 17 00:35:01.642000 audit: BPF prog-id=42 op=UNLOAD May 17 00:35:01.642000 audit: BPF prog-id=43 op=UNLOAD May 17 00:35:01.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.655000 audit: BPF prog-id=51 op=LOAD May 17 00:35:01.655000 audit: BPF prog-id=39 op=UNLOAD May 17 00:35:01.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.669000 audit: BPF prog-id=52 op=LOAD May 17 00:35:01.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit: BPF prog-id=53 op=LOAD May 17 00:35:01.691000 audit: BPF prog-id=30 op=UNLOAD May 17 00:35:01.691000 audit: BPF prog-id=31 op=UNLOAD May 17 00:35:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit: BPF prog-id=54 op=LOAD May 17 00:35:01.691000 audit: BPF prog-id=32 op=UNLOAD May 17 00:35:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit: BPF prog-id=55 op=LOAD May 17 00:35:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.691000 audit: BPF prog-id=56 op=LOAD May 17 00:35:01.691000 audit: BPF prog-id=33 op=UNLOAD May 17 00:35:01.691000 audit: BPF prog-id=34 op=UNLOAD May 17 00:35:01.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit: BPF prog-id=57 op=LOAD May 17 00:35:01.694000 audit: BPF prog-id=35 op=UNLOAD May 17 00:35:01.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit: BPF prog-id=58 op=LOAD May 17 00:35:01.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit: BPF prog-id=59 op=LOAD May 17 00:35:01.694000 audit: BPF prog-id=36 op=UNLOAD May 17 00:35:01.694000 audit: BPF prog-id=37 op=UNLOAD May 17 00:35:01.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.695000 audit: BPF prog-id=60 op=LOAD May 17 00:35:01.695000 audit: BPF prog-id=46 op=UNLOAD May 17 00:35:01.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:01.695000 audit: BPF prog-id=61 op=LOAD May 17 00:35:01.695000 audit: BPF prog-id=44 op=UNLOAD May 17 00:35:01.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:01.713927 systemd[1]: Started kubelet.service. May 17 00:35:01.722533 systemd[1]: Stopping kubelet.service... May 17 00:35:01.723570 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:35:01.723761 systemd[1]: Stopped kubelet.service. May 17 00:35:01.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:01.725436 systemd[1]: Starting kubelet.service... May 17 00:35:02.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:02.010175 systemd[1]: Started kubelet.service. May 17 00:35:02.048265 kubelet[2056]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:35:02.048265 kubelet[2056]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:35:02.048265 kubelet[2056]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:35:02.048765 kubelet[2056]: I0517 00:35:02.048374 2056 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:35:02.853011 kubelet[2056]: I0517 00:35:02.847432 2056 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" May 17 00:35:02.853011 kubelet[2056]: I0517 00:35:02.847459 2056 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:35:02.853011 kubelet[2056]: I0517 00:35:02.847799 2056 server.go:956] "Client rotation is on, will bootstrap in background" May 17 00:35:02.907359 kubelet[2056]: E0517 00:35:02.907310 2056 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://10.200.4.40:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.200.4.40:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" May 17 00:35:02.908019 kubelet[2056]: I0517 00:35:02.907988 2056 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:35:02.917138 kubelet[2056]: E0517 00:35:02.917089 2056 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:35:02.917138 kubelet[2056]: I0517 00:35:02.917130 2056 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:35:02.921313 kubelet[2056]: I0517 00:35:02.921290 2056 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:35:02.921590 kubelet[2056]: I0517 00:35:02.921564 2056 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:35:02.921783 kubelet[2056]: I0517 00:35:02.921590 2056 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-6a88388a60","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:35:02.921932 kubelet[2056]: I0517 00:35:02.921789 2056 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:35:02.921932 kubelet[2056]: I0517 00:35:02.921803 2056 container_manager_linux.go:303] "Creating device plugin manager" May 17 00:35:02.922024 kubelet[2056]: I0517 00:35:02.921937 2056 state_mem.go:36] "Initialized new in-memory state store" May 17 00:35:02.929547 kubelet[2056]: I0517 00:35:02.929526 2056 kubelet.go:480] "Attempting to sync node with API server" May 17 00:35:02.929636 kubelet[2056]: I0517 00:35:02.929551 2056 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:35:02.929636 kubelet[2056]: I0517 00:35:02.929580 2056 kubelet.go:386] "Adding apiserver pod source" May 17 00:35:02.929636 kubelet[2056]: I0517 00:35:02.929601 2056 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:35:02.953600 kubelet[2056]: E0517 00:35:02.953562 2056 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.200.4.40:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-6a88388a60&limit=500&resourceVersion=0\": dial tcp 10.200.4.40:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" May 17 00:35:02.954231 kubelet[2056]: I0517 00:35:02.954210 2056 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:35:02.954929 kubelet[2056]: I0517 00:35:02.954908 2056 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" May 17 00:35:02.956967 kubelet[2056]: W0517 00:35:02.956940 2056 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:35:02.960045 kubelet[2056]: I0517 00:35:02.960027 2056 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:35:02.960129 kubelet[2056]: I0517 00:35:02.960080 2056 server.go:1289] "Started kubelet" May 17 00:35:02.961600 kubelet[2056]: E0517 00:35:02.961570 2056 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.200.4.40:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.4.40:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" May 17 00:35:02.965655 kubelet[2056]: I0517 00:35:02.965596 2056 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:35:02.965000 audit[2056]: AVC avc: denied { mac_admin } for pid=2056 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:02.965000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:35:02.965000 audit[2056]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000994e10 a1=c0008a1c08 a2=c000994de0 a3=25 items=0 ppid=1 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:02.965000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:35:02.965000 audit[2056]: AVC avc: denied { mac_admin } for pid=2056 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:02.965000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:35:02.965000 audit[2056]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00091f660 a1=c0008a1c20 a2=c000994ea0 a3=25 items=0 ppid=1 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:02.965000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:35:02.967927 kubelet[2056]: I0517 00:35:02.967309 2056 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:35:02.967927 kubelet[2056]: I0517 00:35:02.967370 2056 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:35:02.967927 kubelet[2056]: I0517 00:35:02.967461 2056 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:35:02.969849 kubelet[2056]: I0517 00:35:02.969802 2056 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:35:02.970372 kubelet[2056]: I0517 00:35:02.970356 2056 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:35:02.972000 audit[2072]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2072 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:02.972000 audit[2072]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe41b4b020 a2=0 a3=7ffe41b4b00c items=0 ppid=2056 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:02.972000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:35:02.973000 audit[2073]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2073 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:02.973000 audit[2073]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe742b1bd0 a2=0 a3=7ffe742b1bbc items=0 ppid=2056 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:02.973000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:35:02.976077 kubelet[2056]: E0517 00:35:02.974676 2056 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.4.40:6443/api/v1/namespaces/default/events\": dial tcp 10.200.4.40:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.7-n-6a88388a60.18402955947ecf91 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-6a88388a60,UID:ci-3510.3.7-n-6a88388a60,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-6a88388a60,},FirstTimestamp:2025-05-17 00:35:02.960050065 +0000 UTC m=+0.942686104,LastTimestamp:2025-05-17 00:35:02.960050065 +0000 UTC m=+0.942686104,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-6a88388a60,}" May 17 00:35:02.977637 kubelet[2056]: I0517 00:35:02.977501 2056 server.go:317] "Adding debug handlers to kubelet server" May 17 00:35:02.977834 kubelet[2056]: E0517 00:35:02.977817 2056 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:35:02.978053 kubelet[2056]: I0517 00:35:02.978042 2056 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:35:02.978747 kubelet[2056]: I0517 00:35:02.978729 2056 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:35:02.978929 kubelet[2056]: E0517 00:35:02.978905 2056 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6a88388a60\" not found" May 17 00:35:02.979000 audit[2075]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2075 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:02.979000 audit[2075]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffec0d2a8e0 a2=0 a3=7ffec0d2a8cc items=0 ppid=2056 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:02.979000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:35:02.981642 kubelet[2056]: I0517 00:35:02.981627 2056 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:35:02.981761 kubelet[2056]: I0517 00:35:02.981750 2056 reconciler.go:26] "Reconciler: start to sync state" May 17 00:35:02.983174 kubelet[2056]: I0517 00:35:02.983155 2056 factory.go:223] Registration of the systemd container factory successfully May 17 00:35:02.983362 kubelet[2056]: I0517 00:35:02.983344 2056 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:35:02.982000 audit[2077]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2077 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:02.982000 audit[2077]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffeb0e44fa0 a2=0 a3=7ffeb0e44f8c items=0 ppid=2056 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:02.982000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:35:02.986421 kubelet[2056]: E0517 00:35:02.985715 2056 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.200.4.40:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.4.40:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" May 17 00:35:02.986421 kubelet[2056]: E0517 00:35:02.985809 2056 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-6a88388a60?timeout=10s\": dial tcp 10.200.4.40:6443: connect: connection refused" interval="200ms" May 17 00:35:02.990794 kubelet[2056]: I0517 00:35:02.990771 2056 factory.go:223] Registration of the containerd container factory successfully May 17 00:35:03.031315 kubelet[2056]: I0517 00:35:03.031283 2056 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:35:03.029000 audit[2082]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2082 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:03.029000 audit[2082]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe928d2280 a2=0 a3=7ffe928d226c items=0 ppid=2056 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:03.029000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:35:03.031820 kubelet[2056]: I0517 00:35:03.031790 2056 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" May 17 00:35:03.031899 kubelet[2056]: I0517 00:35:03.031812 2056 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:35:03.031985 kubelet[2056]: I0517 00:35:03.031976 2056 state_mem.go:36] "Initialized new in-memory state store" May 17 00:35:03.031000 audit[2084]: NETFILTER_CFG table=mangle:34 family=10 entries=2 op=nft_register_chain pid=2084 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:03.031000 audit[2084]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffee5295210 a2=0 a3=7ffee52951fc items=0 ppid=2056 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:03.031000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:35:03.033601 kubelet[2056]: I0517 00:35:03.033582 2056 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" May 17 00:35:03.032000 audit[2085]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2085 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:03.032000 audit[2085]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffccc2a68d0 a2=0 a3=7ffccc2a68bc items=0 ppid=2056 pid=2085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:03.032000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:35:03.033945 kubelet[2056]: I0517 00:35:03.033908 2056 status_manager.go:230] "Starting to sync pod status with apiserver" May 17 00:35:03.033999 kubelet[2056]: I0517 00:35:03.033948 2056 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:35:03.033999 kubelet[2056]: I0517 00:35:03.033958 2056 kubelet.go:2436] "Starting kubelet main sync loop" May 17 00:35:03.034074 kubelet[2056]: E0517 00:35:03.034009 2056 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:35:03.035283 kubelet[2056]: E0517 00:35:03.035253 2056 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.200.4.40:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.4.40:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" May 17 00:35:03.034000 audit[2087]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=2087 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:03.034000 audit[2087]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcacd7df80 a2=0 a3=7ffcacd7df6c items=0 ppid=2056 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:03.034000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:35:03.035000 audit[2086]: NETFILTER_CFG table=mangle:37 family=10 entries=1 op=nft_register_chain pid=2086 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:03.035000 audit[2086]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe42cfe350 a2=0 a3=7ffe42cfe33c items=0 ppid=2056 pid=2086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:03.035000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:35:03.035000 audit[2089]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_chain pid=2089 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:03.035000 audit[2089]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7bdfa580 a2=0 a3=7ffc7bdfa56c items=0 ppid=2056 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:03.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:35:03.036000 audit[2090]: NETFILTER_CFG table=nat:39 family=10 entries=2 op=nft_register_chain pid=2090 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:03.036000 audit[2090]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdc0bdd900 a2=0 a3=7ffdc0bdd8ec items=0 ppid=2056 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:03.036000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:35:03.037000 audit[2091]: NETFILTER_CFG table=filter:40 family=10 entries=2 op=nft_register_chain pid=2091 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:03.037000 audit[2091]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdcd9c40b0 a2=0 a3=7ffdcd9c409c items=0 ppid=2056 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:03.037000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:35:03.048528 kubelet[2056]: I0517 00:35:03.048509 2056 policy_none.go:49] "None policy: Start" May 17 00:35:03.048528 kubelet[2056]: I0517 00:35:03.048531 2056 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:35:03.048864 kubelet[2056]: I0517 00:35:03.048545 2056 state_mem.go:35] "Initializing new in-memory state store" May 17 00:35:03.056655 systemd[1]: Created slice kubepods.slice. May 17 00:35:03.061121 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:35:03.064083 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:35:03.070065 kubelet[2056]: E0517 00:35:03.070042 2056 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" May 17 00:35:03.068000 audit[2056]: AVC avc: denied { mac_admin } for pid=2056 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:03.068000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:35:03.068000 audit[2056]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005226c0 a1=c000673110 a2=c000522660 a3=25 items=0 ppid=1 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:03.068000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:35:03.071497 kubelet[2056]: E0517 00:35:03.071473 2056 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" May 17 00:35:03.072025 kubelet[2056]: I0517 00:35:03.072011 2056 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:35:03.072151 kubelet[2056]: I0517 00:35:03.072111 2056 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:35:03.072651 kubelet[2056]: I0517 00:35:03.072634 2056 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:35:03.073602 kubelet[2056]: E0517 00:35:03.073579 2056 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:35:03.073687 kubelet[2056]: E0517 00:35:03.073640 2056 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.7-n-6a88388a60\" not found" May 17 00:35:03.147832 systemd[1]: Created slice kubepods-burstable-podf0f519bd7a3cfe24cee1758cff9a1584.slice. May 17 00:35:03.159929 kubelet[2056]: E0517 00:35:03.159894 2056 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-6a88388a60\" not found" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:03.164021 systemd[1]: Created slice kubepods-burstable-poda5adb6d876d91ee758d3909f058acc2e.slice. May 17 00:35:03.169734 kubelet[2056]: E0517 00:35:03.169429 2056 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-6a88388a60\" not found" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:03.171735 systemd[1]: Created slice kubepods-burstable-podb480544e6745b3034a86d9ba7c70cd9a.slice. May 17 00:35:03.174044 kubelet[2056]: I0517 00:35:03.174015 2056 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:03.174449 kubelet[2056]: E0517 00:35:03.174424 2056 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.4.40:6443/api/v1/nodes\": dial tcp 10.200.4.40:6443: connect: connection refused" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:03.174634 kubelet[2056]: E0517 00:35:03.174611 2056 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-6a88388a60\" not found" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:03.182232 kubelet[2056]: I0517 00:35:03.182202 2056 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f0f519bd7a3cfe24cee1758cff9a1584-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-6a88388a60\" (UID: \"f0f519bd7a3cfe24cee1758cff9a1584\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-6a88388a60" May 17 00:35:03.182325 kubelet[2056]: I0517 00:35:03.182231 2056 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f0f519bd7a3cfe24cee1758cff9a1584-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-6a88388a60\" (UID: \"f0f519bd7a3cfe24cee1758cff9a1584\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-6a88388a60" May 17 00:35:03.182325 kubelet[2056]: I0517 00:35:03.182256 2056 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a5adb6d876d91ee758d3909f058acc2e-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-6a88388a60\" (UID: \"a5adb6d876d91ee758d3909f058acc2e\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6a88388a60" May 17 00:35:03.182325 kubelet[2056]: I0517 00:35:03.182277 2056 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a5adb6d876d91ee758d3909f058acc2e-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-6a88388a60\" (UID: \"a5adb6d876d91ee758d3909f058acc2e\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6a88388a60" May 17 00:35:03.182325 kubelet[2056]: I0517 00:35:03.182301 2056 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b480544e6745b3034a86d9ba7c70cd9a-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-6a88388a60\" (UID: \"b480544e6745b3034a86d9ba7c70cd9a\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-6a88388a60" May 17 00:35:03.182325 kubelet[2056]: I0517 00:35:03.182320 2056 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f0f519bd7a3cfe24cee1758cff9a1584-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-6a88388a60\" (UID: \"f0f519bd7a3cfe24cee1758cff9a1584\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-6a88388a60" May 17 00:35:03.182546 kubelet[2056]: I0517 00:35:03.182341 2056 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a5adb6d876d91ee758d3909f058acc2e-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-6a88388a60\" (UID: \"a5adb6d876d91ee758d3909f058acc2e\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6a88388a60" May 17 00:35:03.182546 kubelet[2056]: I0517 00:35:03.182365 2056 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a5adb6d876d91ee758d3909f058acc2e-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-6a88388a60\" (UID: \"a5adb6d876d91ee758d3909f058acc2e\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6a88388a60" May 17 00:35:03.182546 kubelet[2056]: I0517 00:35:03.182401 2056 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a5adb6d876d91ee758d3909f058acc2e-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-6a88388a60\" (UID: \"a5adb6d876d91ee758d3909f058acc2e\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6a88388a60" May 17 00:35:03.186541 kubelet[2056]: E0517 00:35:03.186511 2056 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-6a88388a60?timeout=10s\": dial tcp 10.200.4.40:6443: connect: connection refused" interval="400ms" May 17 00:35:03.376993 kubelet[2056]: I0517 00:35:03.376948 2056 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:03.377407 kubelet[2056]: E0517 00:35:03.377363 2056 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.4.40:6443/api/v1/nodes\": dial tcp 10.200.4.40:6443: connect: connection refused" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:03.461679 env[1435]: time="2025-05-17T00:35:03.461628520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-6a88388a60,Uid:f0f519bd7a3cfe24cee1758cff9a1584,Namespace:kube-system,Attempt:0,}" May 17 00:35:03.471105 env[1435]: time="2025-05-17T00:35:03.471072432Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-6a88388a60,Uid:a5adb6d876d91ee758d3909f058acc2e,Namespace:kube-system,Attempt:0,}" May 17 00:35:03.475619 env[1435]: time="2025-05-17T00:35:03.475587738Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-6a88388a60,Uid:b480544e6745b3034a86d9ba7c70cd9a,Namespace:kube-system,Attempt:0,}" May 17 00:35:03.587923 kubelet[2056]: E0517 00:35:03.587872 2056 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-6a88388a60?timeout=10s\": dial tcp 10.200.4.40:6443: connect: connection refused" interval="800ms" May 17 00:35:03.778931 kubelet[2056]: I0517 00:35:03.778833 2056 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:03.779204 kubelet[2056]: E0517 00:35:03.779176 2056 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.4.40:6443/api/v1/nodes\": dial tcp 10.200.4.40:6443: connect: connection refused" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:04.055525 kubelet[2056]: E0517 00:35:04.055367 2056 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.200.4.40:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-6a88388a60&limit=500&resourceVersion=0\": dial tcp 10.200.4.40:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" May 17 00:35:04.084898 kubelet[2056]: E0517 00:35:04.084844 2056 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.200.4.40:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.4.40:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" May 17 00:35:04.150363 kubelet[2056]: E0517 00:35:04.150317 2056 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.200.4.40:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.4.40:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" May 17 00:35:04.373481 kubelet[2056]: E0517 00:35:04.373339 2056 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.200.4.40:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.4.40:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" May 17 00:35:04.388408 kubelet[2056]: E0517 00:35:04.388343 2056 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-6a88388a60?timeout=10s\": dial tcp 10.200.4.40:6443: connect: connection refused" interval="1.6s" May 17 00:35:04.582009 kubelet[2056]: I0517 00:35:04.581974 2056 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:04.582366 kubelet[2056]: E0517 00:35:04.582326 2056 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.4.40:6443/api/v1/nodes\": dial tcp 10.200.4.40:6443: connect: connection refused" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:05.745170 kubelet[2056]: E0517 00:35:05.745124 2056 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://10.200.4.40:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.200.4.40:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" May 17 00:35:05.989800 kubelet[2056]: E0517 00:35:05.989747 2056 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.4.40:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-6a88388a60?timeout=10s\": dial tcp 10.200.4.40:6443: connect: connection refused" interval="3.2s" May 17 00:35:06.146988 kubelet[2056]: E0517 00:35:06.146856 2056 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.200.4.40:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.4.40:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" May 17 00:35:06.184060 kubelet[2056]: I0517 00:35:06.184023 2056 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:06.184497 kubelet[2056]: E0517 00:35:06.184445 2056 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.200.4.40:6443/api/v1/nodes\": dial tcp 10.200.4.40:6443: connect: connection refused" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:06.687118 kubelet[2056]: E0517 00:35:06.687071 2056 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.200.4.40:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-6a88388a60&limit=500&resourceVersion=0\": dial tcp 10.200.4.40:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" May 17 00:35:07.052970 kubelet[2056]: E0517 00:35:07.052927 2056 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.200.4.40:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.4.40:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" May 17 00:35:07.108694 kubelet[2056]: E0517 00:35:07.108641 2056 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.200.4.40:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.4.40:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" May 17 00:35:07.623733 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3397910504.mount: Deactivated successfully. May 17 00:35:07.667263 env[1435]: time="2025-05-17T00:35:07.667146010Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:07.670567 env[1435]: time="2025-05-17T00:35:07.670523313Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:07.683866 env[1435]: time="2025-05-17T00:35:07.683830227Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:07.689192 env[1435]: time="2025-05-17T00:35:07.689153832Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:07.695414 env[1435]: time="2025-05-17T00:35:07.695371738Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:07.702969 env[1435]: time="2025-05-17T00:35:07.702932646Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:07.706876 env[1435]: time="2025-05-17T00:35:07.706843850Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:07.711009 env[1435]: time="2025-05-17T00:35:07.710977054Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:07.718790 env[1435]: time="2025-05-17T00:35:07.718747362Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:07.727212 env[1435]: time="2025-05-17T00:35:07.727174770Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:07.743687 env[1435]: time="2025-05-17T00:35:07.743652287Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:07.758802 env[1435]: time="2025-05-17T00:35:07.758761902Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:07.809045 env[1435]: time="2025-05-17T00:35:07.808978352Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:35:07.809215 env[1435]: time="2025-05-17T00:35:07.809019452Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:35:07.809306 env[1435]: time="2025-05-17T00:35:07.809202052Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:35:07.809601 env[1435]: time="2025-05-17T00:35:07.809538753Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2c5f43a3f881df0dc4f0511e33e0760911fe57cd57713d0305ddf8901a82eafb pid=2099 runtime=io.containerd.runc.v2 May 17 00:35:07.831865 systemd[1]: Started cri-containerd-2c5f43a3f881df0dc4f0511e33e0760911fe57cd57713d0305ddf8901a82eafb.scope. May 17 00:35:07.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.849580 env[1435]: time="2025-05-17T00:35:07.849530193Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:35:07.849951 env[1435]: time="2025-05-17T00:35:07.849928093Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:35:07.850053 env[1435]: time="2025-05-17T00:35:07.850031393Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:35:07.850515 env[1435]: time="2025-05-17T00:35:07.850484394Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c5ae52fb5732b56ddc7878cf230aa81812d9864c7dcb1119a892f2acc8a7741b pid=2136 runtime=io.containerd.runc.v2 May 17 00:35:07.852971 kernel: kauditd_printk_skb: 217 callbacks suppressed May 17 00:35:07.853048 kernel: audit: type=1400 audit(1747442107.846:459): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.861732 env[1435]: time="2025-05-17T00:35:07.861689405Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:35:07.861870 env[1435]: time="2025-05-17T00:35:07.861848705Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:35:07.861971 env[1435]: time="2025-05-17T00:35:07.861953105Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:35:07.862202 env[1435]: time="2025-05-17T00:35:07.862168605Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1c2d39744903b8ca026cced08739b96ea3909ea7a3825bfdedab658914e1864d pid=2154 runtime=io.containerd.runc.v2 May 17 00:35:07.874609 systemd[1]: Started cri-containerd-c5ae52fb5732b56ddc7878cf230aa81812d9864c7dcb1119a892f2acc8a7741b.scope. May 17 00:35:07.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.895410 kernel: audit: type=1400 audit(1747442107.846:460): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.898002 systemd[1]: Started cri-containerd-1c2d39744903b8ca026cced08739b96ea3909ea7a3825bfdedab658914e1864d.scope. May 17 00:35:07.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.917501 kernel: audit: type=1400 audit(1747442107.846:461): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.957836 kernel: audit: type=1400 audit(1747442107.846:462): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.957939 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:35:07.957967 kernel: audit: type=1400 audit(1747442107.846:463): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.957994 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:35:07.958017 kernel: audit: backlog limit exceeded May 17 00:35:07.958039 kernel: audit: type=1400 audit(1747442107.846:464): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.977592 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:35:07.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.846000 audit: BPF prog-id=62 op=LOAD May 17 00:35:07.868000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2099 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:07.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263356634336133663838316466306463346630353131653333653037 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2099 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:07.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263356634336133663838316466306463346630353131653333653037 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit: BPF prog-id=63 op=LOAD May 17 00:35:07.868000 audit[2110]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00037b6a0 items=0 ppid=2099 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:07.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263356634336133663838316466306463346630353131653333653037 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit: BPF prog-id=64 op=LOAD May 17 00:35:07.868000 audit[2110]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00037b6e8 items=0 ppid=2099 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:07.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263356634336133663838316466306463346630353131653333653037 May 17 00:35:07.868000 audit: BPF prog-id=64 op=UNLOAD May 17 00:35:07.868000 audit: BPF prog-id=63 op=UNLOAD May 17 00:35:07.868000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { perfmon } for pid=2110 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit[2110]: AVC avc: denied { bpf } for pid=2110 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.868000 audit: BPF prog-id=65 op=LOAD May 17 00:35:07.868000 audit[2110]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00037baf8 items=0 ppid=2099 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:07.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263356634336133663838316466306463346630353131653333653037 May 17 00:35:07.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.969000 audit: BPF prog-id=66 op=LOAD May 17 00:35:07.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit: BPF prog-id=67 op=LOAD May 17 00:35:07.981000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2154 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:07.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163326433393734343930336238636130323663636564303837333962 May 17 00:35:07.981000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2154 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:07.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163326433393734343930336238636130323663636564303837333962 May 17 00:35:07.981000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.981000 audit: BPF prog-id=68 op=LOAD May 17 00:35:07.981000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000388ec0 items=0 ppid=2154 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:07.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163326433393734343930336238636130323663636564303837333962 May 17 00:35:07.982000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.982000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.982000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.982000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.982000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.982000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.982000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.982000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.982000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.982000 audit: BPF prog-id=69 op=LOAD May 17 00:35:07.982000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000388f08 items=0 ppid=2154 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:07.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163326433393734343930336238636130323663636564303837333962 May 17 00:35:07.982000 audit: BPF prog-id=69 op=UNLOAD May 17 00:35:07.982000 audit: BPF prog-id=68 op=UNLOAD May 17 00:35:07.982000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.982000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.982000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.982000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.982000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.982000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.982000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.982000 audit[2167]: AVC avc: denied { perfmon } for pid=2167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.982000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.982000 audit[2167]: AVC avc: denied { bpf } for pid=2167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.982000 audit: BPF prog-id=70 op=LOAD May 17 00:35:07.982000 audit[2167]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000389318 items=0 ppid=2154 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:07.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163326433393734343930336238636130323663636564303837333962 May 17 00:35:07.990000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.990000 audit[2145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2136 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:07.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616535326662353733326235366464633738373863663233306161 May 17 00:35:07.990000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.990000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.990000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.990000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.990000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.990000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.990000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.990000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.990000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.990000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.990000 audit: BPF prog-id=71 op=LOAD May 17 00:35:07.990000 audit[2145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000218900 items=0 ppid=2136 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:07.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616535326662353733326235366464633738373863663233306161 May 17 00:35:07.991000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.991000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.991000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.991000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.991000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.991000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.991000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.991000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.991000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.991000 audit: BPF prog-id=72 op=LOAD May 17 00:35:07.991000 audit[2145]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218948 items=0 ppid=2136 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:07.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616535326662353733326235366464633738373863663233306161 May 17 00:35:07.991000 audit: BPF prog-id=72 op=UNLOAD May 17 00:35:07.991000 audit: BPF prog-id=71 op=UNLOAD May 17 00:35:07.991000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.991000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.991000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.991000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.991000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.991000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.991000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.991000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.991000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.991000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:07.991000 audit: BPF prog-id=73 op=LOAD May 17 00:35:07.991000 audit[2145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000218d58 items=0 ppid=2136 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:07.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616535326662353733326235366464633738373863663233306161 May 17 00:35:08.003734 env[1435]: time="2025-05-17T00:35:08.003049046Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-6a88388a60,Uid:f0f519bd7a3cfe24cee1758cff9a1584,Namespace:kube-system,Attempt:0,} returns sandbox id \"2c5f43a3f881df0dc4f0511e33e0760911fe57cd57713d0305ddf8901a82eafb\"" May 17 00:35:08.013782 env[1435]: time="2025-05-17T00:35:08.013747056Z" level=info msg="CreateContainer within sandbox \"2c5f43a3f881df0dc4f0511e33e0760911fe57cd57713d0305ddf8901a82eafb\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 17 00:35:08.034960 env[1435]: time="2025-05-17T00:35:08.034920476Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-6a88388a60,Uid:a5adb6d876d91ee758d3909f058acc2e,Namespace:kube-system,Attempt:0,} returns sandbox id \"c5ae52fb5732b56ddc7878cf230aa81812d9864c7dcb1119a892f2acc8a7741b\"" May 17 00:35:08.040661 env[1435]: time="2025-05-17T00:35:08.040623482Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-6a88388a60,Uid:b480544e6745b3034a86d9ba7c70cd9a,Namespace:kube-system,Attempt:0,} returns sandbox id \"1c2d39744903b8ca026cced08739b96ea3909ea7a3825bfdedab658914e1864d\"" May 17 00:35:08.044314 env[1435]: time="2025-05-17T00:35:08.044283585Z" level=info msg="CreateContainer within sandbox \"c5ae52fb5732b56ddc7878cf230aa81812d9864c7dcb1119a892f2acc8a7741b\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 17 00:35:08.052993 env[1435]: time="2025-05-17T00:35:08.052963993Z" level=info msg="CreateContainer within sandbox \"1c2d39744903b8ca026cced08739b96ea3909ea7a3825bfdedab658914e1864d\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 17 00:35:08.072951 env[1435]: time="2025-05-17T00:35:08.072895112Z" level=info msg="CreateContainer within sandbox \"2c5f43a3f881df0dc4f0511e33e0760911fe57cd57713d0305ddf8901a82eafb\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"f3d79be3a1fdfc7337a0e3755386c719a522362910742d714728e28687c0f7e8\"" May 17 00:35:08.073959 env[1435]: time="2025-05-17T00:35:08.073927413Z" level=info msg="StartContainer for \"f3d79be3a1fdfc7337a0e3755386c719a522362910742d714728e28687c0f7e8\"" May 17 00:35:08.091590 systemd[1]: Started cri-containerd-f3d79be3a1fdfc7337a0e3755386c719a522362910742d714728e28687c0f7e8.scope. May 17 00:35:08.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.107000 audit: BPF prog-id=74 op=LOAD May 17 00:35:08.108000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.108000 audit[2226]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2099 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:08.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633643739626533613166646663373333376130653337353533383663 May 17 00:35:08.108000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.108000 audit[2226]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2099 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:08.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633643739626533613166646663373333376130653337353533383663 May 17 00:35:08.108000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.108000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.108000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.108000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.108000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.108000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.108000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.108000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.108000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.108000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.108000 audit: BPF prog-id=75 op=LOAD May 17 00:35:08.108000 audit[2226]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021b660 items=0 ppid=2099 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:08.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633643739626533613166646663373333376130653337353533383663 May 17 00:35:08.109000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.109000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.109000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.109000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.109000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.109000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.109000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.109000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.109000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.109000 audit: BPF prog-id=76 op=LOAD May 17 00:35:08.109000 audit[2226]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021b6a8 items=0 ppid=2099 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:08.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633643739626533613166646663373333376130653337353533383663 May 17 00:35:08.110000 audit: BPF prog-id=76 op=UNLOAD May 17 00:35:08.110000 audit: BPF prog-id=75 op=UNLOAD May 17 00:35:08.110000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.110000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.110000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.110000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.110000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.110000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.110000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.110000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.110000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.110000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.110000 audit: BPF prog-id=77 op=LOAD May 17 00:35:08.110000 audit[2226]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021bab8 items=0 ppid=2099 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:08.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633643739626533613166646663373333376130653337353533383663 May 17 00:35:08.124536 env[1435]: time="2025-05-17T00:35:08.124489160Z" level=info msg="CreateContainer within sandbox \"c5ae52fb5732b56ddc7878cf230aa81812d9864c7dcb1119a892f2acc8a7741b\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"eec386471b86e81fb7afa7d6013adca7698527e1b6001611b0e93cdabebdeb2d\"" May 17 00:35:08.125050 env[1435]: time="2025-05-17T00:35:08.125024761Z" level=info msg="StartContainer for \"eec386471b86e81fb7afa7d6013adca7698527e1b6001611b0e93cdabebdeb2d\"" May 17 00:35:08.135524 env[1435]: time="2025-05-17T00:35:08.135428571Z" level=info msg="CreateContainer within sandbox \"1c2d39744903b8ca026cced08739b96ea3909ea7a3825bfdedab658914e1864d\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"602237280fabd3c8ad07a82c3ad3e12df7409b877d8d65a8d726c815ba141b20\"" May 17 00:35:08.142641 env[1435]: time="2025-05-17T00:35:08.142612277Z" level=info msg="StartContainer for \"602237280fabd3c8ad07a82c3ad3e12df7409b877d8d65a8d726c815ba141b20\"" May 17 00:35:08.163758 env[1435]: time="2025-05-17T00:35:08.163712097Z" level=info msg="StartContainer for \"f3d79be3a1fdfc7337a0e3755386c719a522362910742d714728e28687c0f7e8\" returns successfully" May 17 00:35:08.167421 systemd[1]: Started cri-containerd-eec386471b86e81fb7afa7d6013adca7698527e1b6001611b0e93cdabebdeb2d.scope. May 17 00:35:08.185366 systemd[1]: Started cri-containerd-602237280fabd3c8ad07a82c3ad3e12df7409b877d8d65a8d726c815ba141b20.scope. May 17 00:35:08.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.210000 audit: BPF prog-id=78 op=LOAD May 17 00:35:08.211000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.211000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2136 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:08.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633338363437316238366538316662376166613764363031336164 May 17 00:35:08.211000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.211000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2136 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:08.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633338363437316238366538316662376166613764363031336164 May 17 00:35:08.212000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.212000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.212000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.212000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.212000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.212000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.212000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.212000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.212000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.212000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.212000 audit: BPF prog-id=79 op=LOAD May 17 00:35:08.212000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a1040 items=0 ppid=2136 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:08.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633338363437316238366538316662376166613764363031336164 May 17 00:35:08.212000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.212000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.212000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.212000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.212000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.212000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.212000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.212000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.212000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.212000 audit: BPF prog-id=80 op=LOAD May 17 00:35:08.212000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a1088 items=0 ppid=2136 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:08.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633338363437316238366538316662376166613764363031336164 May 17 00:35:08.213000 audit: BPF prog-id=80 op=UNLOAD May 17 00:35:08.213000 audit: BPF prog-id=79 op=UNLOAD May 17 00:35:08.213000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.213000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.213000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.213000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.213000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.213000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.213000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.213000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.213000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.213000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.213000 audit: BPF prog-id=81 op=LOAD May 17 00:35:08.213000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a1498 items=0 ppid=2136 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:08.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565633338363437316238366538316662376166613764363031336164 May 17 00:35:08.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.226000 audit: BPF prog-id=82 op=LOAD May 17 00:35:08.227000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.227000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2154 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:08.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630323233373238306661626433633861643037613832633361643365 May 17 00:35:08.228000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.228000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2154 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:08.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630323233373238306661626433633861643037613832633361643365 May 17 00:35:08.228000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.228000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.228000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.228000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.228000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.228000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.228000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.228000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.228000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.228000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.228000 audit: BPF prog-id=83 op=LOAD May 17 00:35:08.228000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000217340 items=0 ppid=2154 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:08.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630323233373238306661626433633861643037613832633361643365 May 17 00:35:08.229000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.229000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.229000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.229000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.229000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.229000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.229000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.229000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.229000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.229000 audit: BPF prog-id=84 op=LOAD May 17 00:35:08.229000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000217388 items=0 ppid=2154 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:08.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630323233373238306661626433633861643037613832633361643365 May 17 00:35:08.229000 audit: BPF prog-id=84 op=UNLOAD May 17 00:35:08.230000 audit: BPF prog-id=83 op=UNLOAD May 17 00:35:08.230000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.230000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.230000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.230000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.230000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.230000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.230000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.230000 audit[2278]: AVC avc: denied { perfmon } for pid=2278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.230000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.230000 audit[2278]: AVC avc: denied { bpf } for pid=2278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:08.230000 audit: BPF prog-id=85 op=LOAD May 17 00:35:08.230000 audit[2278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000217798 items=0 ppid=2154 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:08.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630323233373238306661626433633861643037613832633361643365 May 17 00:35:08.298028 env[1435]: time="2025-05-17T00:35:08.297984223Z" level=info msg="StartContainer for \"602237280fabd3c8ad07a82c3ad3e12df7409b877d8d65a8d726c815ba141b20\" returns successfully" May 17 00:35:08.304553 env[1435]: time="2025-05-17T00:35:08.304513329Z" level=info msg="StartContainer for \"eec386471b86e81fb7afa7d6013adca7698527e1b6001611b0e93cdabebdeb2d\" returns successfully" May 17 00:35:09.053285 kubelet[2056]: E0517 00:35:09.053255 2056 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-6a88388a60\" not found" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:09.056281 kubelet[2056]: E0517 00:35:09.056256 2056 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-6a88388a60\" not found" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:09.060631 kubelet[2056]: E0517 00:35:09.060607 2056 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-6a88388a60\" not found" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:09.386875 kubelet[2056]: I0517 00:35:09.386776 2056 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:09.752000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:09.752000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000aa4450 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:35:09.752000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:09.752000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:09.752000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00037e0a0 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:35:09.752000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:10.061152 kubelet[2056]: E0517 00:35:10.061059 2056 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-6a88388a60\" not found" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:10.061970 kubelet[2056]: E0517 00:35:10.061952 2056 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-6a88388a60\" not found" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:10.062382 kubelet[2056]: E0517 00:35:10.062367 2056 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-6a88388a60\" not found" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:11.013000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:11.013000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c007ccbe60 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:35:11.013000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:35:11.013000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=5267 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:11.013000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c007ccbef0 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:35:11.013000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:35:11.014000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:11.014000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0043bd9e0 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:35:11.014000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:35:11.033000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=5273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:11.033000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c004fc8ff0 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:35:11.033000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:35:11.065098 kubelet[2056]: E0517 00:35:11.065068 2056 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-6a88388a60\" not found" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:11.065841 kubelet[2056]: E0517 00:35:11.065820 2056 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-6a88388a60\" not found" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:11.066064 kubelet[2056]: E0517 00:35:11.066047 2056 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ci-3510.3.7-n-6a88388a60\" not found" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:11.097356 kubelet[2056]: E0517 00:35:11.097321 2056 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.7-n-6a88388a60\" not found" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:11.124000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:11.124000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c005897160 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:35:11.124000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:35:11.125000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:11.125000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00481fec0 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:35:11.125000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:35:11.223129 kubelet[2056]: E0517 00:35:11.223025 2056 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{ci-3510.3.7-n-6a88388a60.18402955947ecf91 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-6a88388a60,UID:ci-3510.3.7-n-6a88388a60,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-6a88388a60,},FirstTimestamp:2025-05-17 00:35:02.960050065 +0000 UTC m=+0.942686104,LastTimestamp:2025-05-17 00:35:02.960050065 +0000 UTC m=+0.942686104,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-6a88388a60,}" May 17 00:35:11.286569 kubelet[2056]: I0517 00:35:11.286451 2056 kubelet_node_status.go:78] "Successfully registered node" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:11.286802 kubelet[2056]: E0517 00:35:11.286783 2056 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"ci-3510.3.7-n-6a88388a60\": node \"ci-3510.3.7-n-6a88388a60\" not found" May 17 00:35:11.295964 kubelet[2056]: E0517 00:35:11.294226 2056 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{ci-3510.3.7-n-6a88388a60.18402955958daf06 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-6a88388a60,UID:ci-3510.3.7-n-6a88388a60,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-6a88388a60,},FirstTimestamp:2025-05-17 00:35:02.97780199 +0000 UTC m=+0.960438029,LastTimestamp:2025-05-17 00:35:02.97780199 +0000 UTC m=+0.960438029,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-6a88388a60,}" May 17 00:35:11.380918 kubelet[2056]: I0517 00:35:11.380880 2056 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-6a88388a60" May 17 00:35:11.399711 kubelet[2056]: E0517 00:35:11.399677 2056 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510.3.7-n-6a88388a60\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.7-n-6a88388a60" May 17 00:35:11.399901 kubelet[2056]: I0517 00:35:11.399889 2056 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6a88388a60" May 17 00:35:11.404987 kubelet[2056]: E0517 00:35:11.404961 2056 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ci-3510.3.7-n-6a88388a60\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6a88388a60" May 17 00:35:11.405159 kubelet[2056]: I0517 00:35:11.405145 2056 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.7-n-6a88388a60" May 17 00:35:11.410848 kubelet[2056]: E0517 00:35:11.410826 2056 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510.3.7-n-6a88388a60\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-ci-3510.3.7-n-6a88388a60" May 17 00:35:11.972720 kubelet[2056]: I0517 00:35:11.972672 2056 apiserver.go:52] "Watching apiserver" May 17 00:35:11.982450 kubelet[2056]: I0517 00:35:11.982404 2056 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:35:12.065305 kubelet[2056]: I0517 00:35:12.065263 2056 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.7-n-6a88388a60" May 17 00:35:12.073209 kubelet[2056]: I0517 00:35:12.073168 2056 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" May 17 00:35:13.197208 systemd[1]: Reloading. May 17 00:35:13.276288 /usr/lib/systemd/system-generators/torcx-generator[2357]: time="2025-05-17T00:35:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:35:13.276328 /usr/lib/systemd/system-generators/torcx-generator[2357]: time="2025-05-17T00:35:13Z" level=info msg="torcx already run" May 17 00:35:13.371971 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:35:13.371992 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:35:13.389827 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:35:13.486994 kernel: kauditd_printk_skb: 358 callbacks suppressed May 17 00:35:13.487130 kernel: audit: type=1400 audit(1747442113.467:573): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.519149 kernel: audit: type=1400 audit(1747442113.467:574): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.519253 kernel: audit: type=1400 audit(1747442113.467:575): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.532544 kernel: audit: type=1400 audit(1747442113.467:576): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.532609 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:35:13.548573 kernel: audit: type=1400 audit(1747442113.467:577): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.548651 kernel: audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 May 17 00:35:13.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.569078 kernel: audit: type=1400 audit(1747442113.467:578): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.569148 kernel: audit: backlog limit exceeded May 17 00:35:13.569170 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 17 00:35:13.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.485000 audit: BPF prog-id=86 op=LOAD May 17 00:35:13.485000 audit: BPF prog-id=67 op=UNLOAD May 17 00:35:13.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.489000 audit: BPF prog-id=87 op=LOAD May 17 00:35:13.489000 audit: BPF prog-id=82 op=UNLOAD May 17 00:35:13.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.490000 audit: BPF prog-id=88 op=LOAD May 17 00:35:13.490000 audit: BPF prog-id=74 op=UNLOAD May 17 00:35:13.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.505000 audit: BPF prog-id=89 op=LOAD May 17 00:35:13.505000 audit: BPF prog-id=47 op=UNLOAD May 17 00:35:13.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.530000 audit: BPF prog-id=90 op=LOAD May 17 00:35:13.530000 audit: BPF prog-id=48 op=UNLOAD May 17 00:35:13.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.530000 audit: BPF prog-id=91 op=LOAD May 17 00:35:13.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.572000 audit: BPF prog-id=92 op=LOAD May 17 00:35:13.572000 audit: BPF prog-id=49 op=UNLOAD May 17 00:35:13.572000 audit: BPF prog-id=50 op=UNLOAD May 17 00:35:13.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.572000 audit: BPF prog-id=93 op=LOAD May 17 00:35:13.572000 audit: BPF prog-id=51 op=UNLOAD May 17 00:35:13.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.573000 audit: BPF prog-id=94 op=LOAD May 17 00:35:13.573000 audit: BPF prog-id=78 op=UNLOAD May 17 00:35:13.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.574000 audit: BPF prog-id=95 op=LOAD May 17 00:35:13.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.574000 audit: BPF prog-id=96 op=LOAD May 17 00:35:13.574000 audit: BPF prog-id=52 op=UNLOAD May 17 00:35:13.574000 audit: BPF prog-id=53 op=UNLOAD May 17 00:35:13.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.575000 audit: BPF prog-id=97 op=LOAD May 17 00:35:13.575000 audit: BPF prog-id=54 op=UNLOAD May 17 00:35:13.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.576000 audit: BPF prog-id=98 op=LOAD May 17 00:35:13.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.576000 audit: BPF prog-id=99 op=LOAD May 17 00:35:13.576000 audit: BPF prog-id=55 op=UNLOAD May 17 00:35:13.576000 audit: BPF prog-id=56 op=UNLOAD May 17 00:35:13.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.577000 audit: BPF prog-id=100 op=LOAD May 17 00:35:13.577000 audit: BPF prog-id=62 op=UNLOAD May 17 00:35:13.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit: BPF prog-id=101 op=LOAD May 17 00:35:13.579000 audit: BPF prog-id=57 op=UNLOAD May 17 00:35:13.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit: BPF prog-id=102 op=LOAD May 17 00:35:13.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit: BPF prog-id=103 op=LOAD May 17 00:35:13.579000 audit: BPF prog-id=58 op=UNLOAD May 17 00:35:13.579000 audit: BPF prog-id=59 op=UNLOAD May 17 00:35:13.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.580000 audit: BPF prog-id=104 op=LOAD May 17 00:35:13.580000 audit: BPF prog-id=60 op=UNLOAD May 17 00:35:13.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.580000 audit: BPF prog-id=105 op=LOAD May 17 00:35:13.580000 audit: BPF prog-id=66 op=UNLOAD May 17 00:35:13.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.582000 audit: BPF prog-id=106 op=LOAD May 17 00:35:13.582000 audit: BPF prog-id=61 op=UNLOAD May 17 00:35:13.600910 systemd[1]: Stopping kubelet.service... May 17 00:35:13.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:13.624676 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:35:13.624834 systemd[1]: Stopped kubelet.service. May 17 00:35:13.626767 systemd[1]: Starting kubelet.service... May 17 00:35:13.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:13.841605 systemd[1]: Started kubelet.service. May 17 00:35:13.904540 kubelet[2423]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:35:13.904540 kubelet[2423]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:35:13.904540 kubelet[2423]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:35:13.905092 kubelet[2423]: I0517 00:35:13.904650 2423 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:35:13.912032 kubelet[2423]: I0517 00:35:13.911998 2423 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" May 17 00:35:13.912032 kubelet[2423]: I0517 00:35:13.912021 2423 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:35:13.912267 kubelet[2423]: I0517 00:35:13.912248 2423 server.go:956] "Client rotation is on, will bootstrap in background" May 17 00:35:13.913791 kubelet[2423]: I0517 00:35:13.913764 2423 certificate_store.go:147] "Loading cert/key pair from a file" filePath="/var/lib/kubelet/pki/kubelet-client-current.pem" May 17 00:35:13.916770 kubelet[2423]: I0517 00:35:13.916736 2423 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:35:13.926371 kubelet[2423]: E0517 00:35:13.924325 2423 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:35:13.926371 kubelet[2423]: I0517 00:35:13.924357 2423 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:35:13.933562 kubelet[2423]: I0517 00:35:13.933538 2423 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:35:13.933772 kubelet[2423]: I0517 00:35:13.933745 2423 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:35:13.933934 kubelet[2423]: I0517 00:35:13.933769 2423 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-6a88388a60","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:35:13.934080 kubelet[2423]: I0517 00:35:13.933938 2423 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:35:13.934080 kubelet[2423]: I0517 00:35:13.933952 2423 container_manager_linux.go:303] "Creating device plugin manager" May 17 00:35:13.934080 kubelet[2423]: I0517 00:35:13.934006 2423 state_mem.go:36] "Initialized new in-memory state store" May 17 00:35:13.934202 kubelet[2423]: I0517 00:35:13.934150 2423 kubelet.go:480] "Attempting to sync node with API server" May 17 00:35:13.934202 kubelet[2423]: I0517 00:35:13.934166 2423 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:35:13.934202 kubelet[2423]: I0517 00:35:13.934191 2423 kubelet.go:386] "Adding apiserver pod source" May 17 00:35:13.934328 kubelet[2423]: I0517 00:35:13.934209 2423 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:35:13.935848 kubelet[2423]: I0517 00:35:13.935829 2423 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:35:13.936621 kubelet[2423]: I0517 00:35:13.936550 2423 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" May 17 00:35:13.943433 kubelet[2423]: I0517 00:35:13.943415 2423 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:35:13.943611 kubelet[2423]: I0517 00:35:13.943597 2423 server.go:1289] "Started kubelet" May 17 00:35:13.943000 audit[2423]: AVC avc: denied { mac_admin } for pid=2423 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.943000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:35:13.943000 audit[2423]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b42090 a1=c00092d9f8 a2=c000b42060 a3=25 items=0 ppid=1 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:13.943000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:35:13.945771 kubelet[2423]: I0517 00:35:13.945750 2423 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:35:13.944000 audit[2423]: AVC avc: denied { mac_admin } for pid=2423 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:13.944000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:35:13.944000 audit[2423]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007f3020 a1=c00092da10 a2=c000b42120 a3=25 items=0 ppid=1 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:13.944000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:35:13.946179 kubelet[2423]: I0517 00:35:13.946156 2423 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:35:13.946287 kubelet[2423]: I0517 00:35:13.946275 2423 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:35:13.955060 kubelet[2423]: I0517 00:35:13.955030 2423 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:35:13.956652 kubelet[2423]: I0517 00:35:13.956634 2423 server.go:317] "Adding debug handlers to kubelet server" May 17 00:35:13.960009 kubelet[2423]: I0517 00:35:13.959961 2423 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:35:13.960259 kubelet[2423]: I0517 00:35:13.960246 2423 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:35:13.960548 kubelet[2423]: I0517 00:35:13.960532 2423 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:35:13.962580 kubelet[2423]: I0517 00:35:13.962563 2423 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:35:13.963343 kubelet[2423]: E0517 00:35:13.963322 2423 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-6a88388a60\" not found" May 17 00:35:13.965519 kubelet[2423]: I0517 00:35:13.965492 2423 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:35:13.965749 kubelet[2423]: I0517 00:35:13.965735 2423 reconciler.go:26] "Reconciler: start to sync state" May 17 00:35:13.967609 kubelet[2423]: I0517 00:35:13.967585 2423 factory.go:223] Registration of the systemd container factory successfully May 17 00:35:13.967717 kubelet[2423]: I0517 00:35:13.967696 2423 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:35:13.968002 kubelet[2423]: I0517 00:35:13.967970 2423 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" May 17 00:35:13.969285 kubelet[2423]: I0517 00:35:13.969266 2423 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" May 17 00:35:13.970231 kubelet[2423]: I0517 00:35:13.970220 2423 status_manager.go:230] "Starting to sync pod status with apiserver" May 17 00:35:13.970318 kubelet[2423]: I0517 00:35:13.970310 2423 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:35:13.970363 kubelet[2423]: I0517 00:35:13.970357 2423 kubelet.go:2436] "Starting kubelet main sync loop" May 17 00:35:13.970486 kubelet[2423]: E0517 00:35:13.970468 2423 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:35:13.989418 kubelet[2423]: I0517 00:35:13.985284 2423 factory.go:223] Registration of the containerd container factory successfully May 17 00:35:14.011516 kubelet[2423]: E0517 00:35:13.987830 2423 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:35:14.048774 kubelet[2423]: I0517 00:35:14.048741 2423 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:35:14.048774 kubelet[2423]: I0517 00:35:14.048777 2423 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:35:14.048974 kubelet[2423]: I0517 00:35:14.048801 2423 state_mem.go:36] "Initialized new in-memory state store" May 17 00:35:14.048974 kubelet[2423]: I0517 00:35:14.048963 2423 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 17 00:35:14.049083 kubelet[2423]: I0517 00:35:14.048982 2423 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 17 00:35:14.049083 kubelet[2423]: I0517 00:35:14.049006 2423 policy_none.go:49] "None policy: Start" May 17 00:35:14.049083 kubelet[2423]: I0517 00:35:14.049019 2423 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:35:14.049083 kubelet[2423]: I0517 00:35:14.049031 2423 state_mem.go:35] "Initializing new in-memory state store" May 17 00:35:14.049237 kubelet[2423]: I0517 00:35:14.049144 2423 state_mem.go:75] "Updated machine memory state" May 17 00:35:14.052747 kubelet[2423]: E0517 00:35:14.052729 2423 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" May 17 00:35:14.051000 audit[2423]: AVC avc: denied { mac_admin } for pid=2423 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:14.051000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:35:14.051000 audit[2423]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b43020 a1=c000c2c4e0 a2=c000b42fc0 a3=25 items=0 ppid=1 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:14.051000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:35:14.053107 kubelet[2423]: E0517 00:35:14.053094 2423 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" May 17 00:35:14.053259 kubelet[2423]: I0517 00:35:14.053249 2423 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:35:14.053331 kubelet[2423]: I0517 00:35:14.053308 2423 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:35:14.054042 kubelet[2423]: I0517 00:35:14.054028 2423 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:35:14.057843 kubelet[2423]: E0517 00:35:14.057822 2423 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:35:14.071302 kubelet[2423]: I0517 00:35:14.071281 2423 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-6a88388a60" May 17 00:35:14.071475 kubelet[2423]: I0517 00:35:14.071459 2423 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6a88388a60" May 17 00:35:14.072148 kubelet[2423]: I0517 00:35:14.071733 2423 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.7-n-6a88388a60" May 17 00:35:14.084613 kubelet[2423]: I0517 00:35:14.084585 2423 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" May 17 00:35:14.084719 kubelet[2423]: I0517 00:35:14.084642 2423 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" May 17 00:35:14.084780 kubelet[2423]: I0517 00:35:14.084723 2423 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" May 17 00:35:14.084924 kubelet[2423]: E0517 00:35:14.084902 2423 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510.3.7-n-6a88388a60\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.7-n-6a88388a60" May 17 00:35:14.156808 kubelet[2423]: I0517 00:35:14.156694 2423 kubelet_node_status.go:75] "Attempting to register node" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:14.166934 kubelet[2423]: I0517 00:35:14.166894 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a5adb6d876d91ee758d3909f058acc2e-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-6a88388a60\" (UID: \"a5adb6d876d91ee758d3909f058acc2e\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6a88388a60" May 17 00:35:14.167135 kubelet[2423]: I0517 00:35:14.167109 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a5adb6d876d91ee758d3909f058acc2e-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-6a88388a60\" (UID: \"a5adb6d876d91ee758d3909f058acc2e\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6a88388a60" May 17 00:35:14.167241 kubelet[2423]: I0517 00:35:14.167157 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b480544e6745b3034a86d9ba7c70cd9a-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-6a88388a60\" (UID: \"b480544e6745b3034a86d9ba7c70cd9a\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-6a88388a60" May 17 00:35:14.167241 kubelet[2423]: I0517 00:35:14.167184 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a5adb6d876d91ee758d3909f058acc2e-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-6a88388a60\" (UID: \"a5adb6d876d91ee758d3909f058acc2e\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6a88388a60" May 17 00:35:14.167241 kubelet[2423]: I0517 00:35:14.167206 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a5adb6d876d91ee758d3909f058acc2e-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-6a88388a60\" (UID: \"a5adb6d876d91ee758d3909f058acc2e\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6a88388a60" May 17 00:35:14.167369 kubelet[2423]: I0517 00:35:14.167243 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a5adb6d876d91ee758d3909f058acc2e-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-6a88388a60\" (UID: \"a5adb6d876d91ee758d3909f058acc2e\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6a88388a60" May 17 00:35:14.167369 kubelet[2423]: I0517 00:35:14.167266 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f0f519bd7a3cfe24cee1758cff9a1584-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-6a88388a60\" (UID: \"f0f519bd7a3cfe24cee1758cff9a1584\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-6a88388a60" May 17 00:35:14.167369 kubelet[2423]: I0517 00:35:14.167290 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f0f519bd7a3cfe24cee1758cff9a1584-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-6a88388a60\" (UID: \"f0f519bd7a3cfe24cee1758cff9a1584\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-6a88388a60" May 17 00:35:14.167369 kubelet[2423]: I0517 00:35:14.167325 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f0f519bd7a3cfe24cee1758cff9a1584-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-6a88388a60\" (UID: \"f0f519bd7a3cfe24cee1758cff9a1584\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-6a88388a60" May 17 00:35:14.169684 kubelet[2423]: I0517 00:35:14.169646 2423 kubelet_node_status.go:124] "Node was previously registered" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:14.169785 kubelet[2423]: I0517 00:35:14.169739 2423 kubelet_node_status.go:78] "Successfully registered node" node="ci-3510.3.7-n-6a88388a60" May 17 00:35:14.935069 kubelet[2423]: I0517 00:35:14.935025 2423 apiserver.go:52] "Watching apiserver" May 17 00:35:14.966422 kubelet[2423]: I0517 00:35:14.966378 2423 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:35:15.019439 kubelet[2423]: I0517 00:35:15.019404 2423 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ci-3510.3.7-n-6a88388a60" May 17 00:35:15.019798 kubelet[2423]: I0517 00:35:15.019772 2423 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ci-3510.3.7-n-6a88388a60" May 17 00:35:15.034704 kubelet[2423]: I0517 00:35:15.034670 2423 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" May 17 00:35:15.034846 kubelet[2423]: E0517 00:35:15.034731 2423 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-ci-3510.3.7-n-6a88388a60\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.7-n-6a88388a60" May 17 00:35:15.039339 kubelet[2423]: I0517 00:35:15.039283 2423 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" May 17 00:35:15.039465 kubelet[2423]: E0517 00:35:15.039364 2423 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-ci-3510.3.7-n-6a88388a60\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.7-n-6a88388a60" May 17 00:35:15.072695 kubelet[2423]: I0517 00:35:15.072616 2423 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.7-n-6a88388a60" podStartSLOduration=1.072595811 podStartE2EDuration="1.072595811s" podCreationTimestamp="2025-05-17 00:35:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:35:15.050116362 +0000 UTC m=+1.201147937" watchObservedRunningTime="2025-05-17 00:35:15.072595811 +0000 UTC m=+1.223627486" May 17 00:35:15.088673 kubelet[2423]: I0517 00:35:15.088614 2423 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-6a88388a60" podStartSLOduration=1.088592385 podStartE2EDuration="1.088592385s" podCreationTimestamp="2025-05-17 00:35:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:35:15.073460574 +0000 UTC m=+1.224492249" watchObservedRunningTime="2025-05-17 00:35:15.088592385 +0000 UTC m=+1.239624060" May 17 00:35:15.218000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:15.218000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000bc1920 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:35:15.218000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:15.218000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:15.218000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000bc1960 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:35:15.218000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:15.219000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:15.219000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000bc1de0 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:35:15.219000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:15.220000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:15.220000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e15460 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:35:15.220000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:16.664000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=5298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:35:16.664000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000fab300 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:35:16.664000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:18.703398 kubelet[2423]: I0517 00:35:18.703350 2423 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 17 00:35:18.703938 env[1435]: time="2025-05-17T00:35:18.703803619Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:35:18.704264 kubelet[2423]: I0517 00:35:18.704069 2423 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 17 00:35:19.648069 systemd[1]: Created slice kubepods-besteffort-pod82383861_82f8_412f_a8cf_9b1522b2c7ed.slice. May 17 00:35:19.699302 kubelet[2423]: I0517 00:35:19.699258 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/82383861-82f8-412f-a8cf-9b1522b2c7ed-lib-modules\") pod \"kube-proxy-rvsrr\" (UID: \"82383861-82f8-412f-a8cf-9b1522b2c7ed\") " pod="kube-system/kube-proxy-rvsrr" May 17 00:35:19.699302 kubelet[2423]: I0517 00:35:19.699308 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4df5v\" (UniqueName: \"kubernetes.io/projected/82383861-82f8-412f-a8cf-9b1522b2c7ed-kube-api-access-4df5v\") pod \"kube-proxy-rvsrr\" (UID: \"82383861-82f8-412f-a8cf-9b1522b2c7ed\") " pod="kube-system/kube-proxy-rvsrr" May 17 00:35:19.699592 kubelet[2423]: I0517 00:35:19.699344 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/82383861-82f8-412f-a8cf-9b1522b2c7ed-kube-proxy\") pod \"kube-proxy-rvsrr\" (UID: \"82383861-82f8-412f-a8cf-9b1522b2c7ed\") " pod="kube-system/kube-proxy-rvsrr" May 17 00:35:19.699592 kubelet[2423]: I0517 00:35:19.699369 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/82383861-82f8-412f-a8cf-9b1522b2c7ed-xtables-lock\") pod \"kube-proxy-rvsrr\" (UID: \"82383861-82f8-412f-a8cf-9b1522b2c7ed\") " pod="kube-system/kube-proxy-rvsrr" May 17 00:35:19.808138 kubelet[2423]: I0517 00:35:19.808095 2423 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:35:19.880067 systemd[1]: Created slice kubepods-besteffort-podab194c90_4d23_426c_a99c_46591f3cbd8a.slice. May 17 00:35:19.911437 kubelet[2423]: I0517 00:35:19.908328 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9pdh5\" (UniqueName: \"kubernetes.io/projected/ab194c90-4d23-426c-a99c-46591f3cbd8a-kube-api-access-9pdh5\") pod \"tigera-operator-844669ff44-qzv5v\" (UID: \"ab194c90-4d23-426c-a99c-46591f3cbd8a\") " pod="tigera-operator/tigera-operator-844669ff44-qzv5v" May 17 00:35:19.912976 kubelet[2423]: I0517 00:35:19.912929 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ab194c90-4d23-426c-a99c-46591f3cbd8a-var-lib-calico\") pod \"tigera-operator-844669ff44-qzv5v\" (UID: \"ab194c90-4d23-426c-a99c-46591f3cbd8a\") " pod="tigera-operator/tigera-operator-844669ff44-qzv5v" May 17 00:35:19.955814 env[1435]: time="2025-05-17T00:35:19.955289232Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rvsrr,Uid:82383861-82f8-412f-a8cf-9b1522b2c7ed,Namespace:kube-system,Attempt:0,}" May 17 00:35:20.012215 env[1435]: time="2025-05-17T00:35:20.012110047Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:35:20.012372 env[1435]: time="2025-05-17T00:35:20.012225554Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:35:20.012372 env[1435]: time="2025-05-17T00:35:20.012273457Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:35:20.012627 env[1435]: time="2025-05-17T00:35:20.012585877Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5c855ac51255858ab52425954a7613651a7ee249b9e238a330bcec0c735bbbe1 pid=2479 runtime=io.containerd.runc.v2 May 17 00:35:20.042570 systemd[1]: Started cri-containerd-5c855ac51255858ab52425954a7613651a7ee249b9e238a330bcec0c735bbbe1.scope. May 17 00:35:20.068449 kernel: kauditd_printk_skb: 267 callbacks suppressed May 17 00:35:20.068578 kernel: audit: type=1400 audit(1747442120.058:825): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.104409 kernel: audit: type=1400 audit(1747442120.058:826): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.104786 kernel: audit: type=1400 audit(1747442120.058:827): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.104822 kernel: audit: type=1400 audit(1747442120.058:828): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.117196 kernel: audit: type=1400 audit(1747442120.058:829): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.129511 kernel: audit: type=1400 audit(1747442120.058:830): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.150605 kernel: audit: type=1400 audit(1747442120.058:831): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.167301 kernel: audit: type=1400 audit(1747442120.058:832): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.183315 env[1435]: time="2025-05-17T00:35:20.183283599Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-qzv5v,Uid:ab194c90-4d23-426c-a99c-46591f3cbd8a,Namespace:tigera-operator,Attempt:0,}" May 17 00:35:20.184202 env[1435]: time="2025-05-17T00:35:20.183689725Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rvsrr,Uid:82383861-82f8-412f-a8cf-9b1522b2c7ed,Namespace:kube-system,Attempt:0,} returns sandbox id \"5c855ac51255858ab52425954a7613651a7ee249b9e238a330bcec0c735bbbe1\"" May 17 00:35:20.193994 kernel: audit: type=1400 audit(1747442120.058:833): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.194070 kernel: audit: type=1400 audit(1747442120.058:834): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.058000 audit: BPF prog-id=107 op=LOAD May 17 00:35:20.068000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.068000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2479 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563383535616335313235353835386162353234323539353461373631 May 17 00:35:20.068000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.068000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2479 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563383535616335313235353835386162353234323539353461373631 May 17 00:35:20.068000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.068000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.068000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.068000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.068000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.068000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.068000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.068000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.068000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.068000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.068000 audit: BPF prog-id=108 op=LOAD May 17 00:35:20.068000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000185fc0 items=0 ppid=2479 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563383535616335313235353835386162353234323539353461373631 May 17 00:35:20.077000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.077000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.077000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.077000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.077000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.077000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.077000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.077000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.077000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.077000 audit: BPF prog-id=109 op=LOAD May 17 00:35:20.077000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c0008 items=0 ppid=2479 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563383535616335313235353835386162353234323539353461373631 May 17 00:35:20.077000 audit: BPF prog-id=109 op=UNLOAD May 17 00:35:20.077000 audit: BPF prog-id=108 op=UNLOAD May 17 00:35:20.078000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.078000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.078000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.078000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.078000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.078000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.078000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.078000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.078000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.078000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.078000 audit: BPF prog-id=110 op=LOAD May 17 00:35:20.078000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c0418 items=0 ppid=2479 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563383535616335313235353835386162353234323539353461373631 May 17 00:35:20.200612 env[1435]: time="2025-05-17T00:35:20.200578605Z" level=info msg="CreateContainer within sandbox \"5c855ac51255858ab52425954a7613651a7ee249b9e238a330bcec0c735bbbe1\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:35:20.269555 env[1435]: time="2025-05-17T00:35:20.269452712Z" level=info msg="CreateContainer within sandbox \"5c855ac51255858ab52425954a7613651a7ee249b9e238a330bcec0c735bbbe1\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"6bef3356f8decf3eeb95b9ae9a96bd4343caa431f9ec646a519ef86583445587\"" May 17 00:35:20.271451 env[1435]: time="2025-05-17T00:35:20.270264364Z" level=info msg="StartContainer for \"6bef3356f8decf3eeb95b9ae9a96bd4343caa431f9ec646a519ef86583445587\"" May 17 00:35:20.275466 env[1435]: time="2025-05-17T00:35:20.266875247Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:35:20.275466 env[1435]: time="2025-05-17T00:35:20.266904249Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:35:20.275466 env[1435]: time="2025-05-17T00:35:20.266913649Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:35:20.275466 env[1435]: time="2025-05-17T00:35:20.267063459Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d1979131577eb1514c5d39c8141ddc9af48b89875bff7b61d58809858942bf29 pid=2521 runtime=io.containerd.runc.v2 May 17 00:35:20.297130 systemd[1]: Started cri-containerd-6bef3356f8decf3eeb95b9ae9a96bd4343caa431f9ec646a519ef86583445587.scope. May 17 00:35:20.310321 systemd[1]: Started cri-containerd-d1979131577eb1514c5d39c8141ddc9af48b89875bff7b61d58809858942bf29.scope. May 17 00:35:20.330000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fbb414b22f8 items=0 ppid=2479 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662656633333536663864656366336565623935623961653961393662 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit: BPF prog-id=111 op=LOAD May 17 00:35:20.330000 audit[2541]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0000247b8 items=0 ppid=2479 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662656633333536663864656366336565623935623961653961393662 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit: BPF prog-id=112 op=LOAD May 17 00:35:20.330000 audit[2541]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000024808 items=0 ppid=2479 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662656633333536663864656366336565623935623961653961393662 May 17 00:35:20.330000 audit: BPF prog-id=112 op=UNLOAD May 17 00:35:20.330000 audit: BPF prog-id=111 op=UNLOAD May 17 00:35:20.330000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.330000 audit: BPF prog-id=113 op=LOAD May 17 00:35:20.330000 audit[2541]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000024898 items=0 ppid=2479 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662656633333536663864656366336565623935623961653961393662 May 17 00:35:20.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.335000 audit: BPF prog-id=114 op=LOAD May 17 00:35:20.336000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2521 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431393739313331353737656231353134633564333963383134316464 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2521 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431393739313331353737656231353134633564333963383134316464 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit: BPF prog-id=115 op=LOAD May 17 00:35:20.336000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002cbce0 items=0 ppid=2521 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431393739313331353737656231353134633564333963383134316464 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit: BPF prog-id=116 op=LOAD May 17 00:35:20.336000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002cbd28 items=0 ppid=2521 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431393739313331353737656231353134633564333963383134316464 May 17 00:35:20.336000 audit: BPF prog-id=116 op=UNLOAD May 17 00:35:20.336000 audit: BPF prog-id=115 op=UNLOAD May 17 00:35:20.336000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:20.336000 audit: BPF prog-id=117 op=LOAD May 17 00:35:20.336000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003d0138 items=0 ppid=2521 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431393739313331353737656231353134633564333963383134316464 May 17 00:35:20.369837 env[1435]: time="2025-05-17T00:35:20.369793731Z" level=info msg="StartContainer for \"6bef3356f8decf3eeb95b9ae9a96bd4343caa431f9ec646a519ef86583445587\" returns successfully" May 17 00:35:20.379956 env[1435]: time="2025-05-17T00:35:20.379906778Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-qzv5v,Uid:ab194c90-4d23-426c-a99c-46591f3cbd8a,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"d1979131577eb1514c5d39c8141ddc9af48b89875bff7b61d58809858942bf29\"" May 17 00:35:20.383637 env[1435]: time="2025-05-17T00:35:20.383603215Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\"" May 17 00:35:20.505000 audit[2624]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2624 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.505000 audit[2624]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb9024ac0 a2=0 a3=7ffeb9024aac items=0 ppid=2559 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.505000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:35:20.508000 audit[2623]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=2623 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.508000 audit[2623]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff63e116b0 a2=0 a3=7fff63e1169c items=0 ppid=2559 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.508000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:35:20.509000 audit[2626]: NETFILTER_CFG table=nat:43 family=10 entries=1 op=nft_register_chain pid=2626 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.509000 audit[2626]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd56d2a870 a2=0 a3=7ffd56d2a85c items=0 ppid=2559 pid=2626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.509000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:35:20.513000 audit[2630]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2630 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.513000 audit[2630]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7b0685b0 a2=0 a3=7ffe7b06859c items=0 ppid=2559 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.513000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:35:20.518000 audit[2631]: NETFILTER_CFG table=nat:45 family=2 entries=1 op=nft_register_chain pid=2631 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.518000 audit[2631]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebb3aab00 a2=0 a3=7ffebb3aaaec items=0 ppid=2559 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.518000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:35:20.520000 audit[2632]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=2632 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.520000 audit[2632]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea4d32be0 a2=0 a3=7ffea4d32bcc items=0 ppid=2559 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.520000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:35:20.604000 audit[2633]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2633 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.604000 audit[2633]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff88899f80 a2=0 a3=7fff88899f6c items=0 ppid=2559 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.604000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:35:20.607000 audit[2635]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2635 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.607000 audit[2635]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff9bbbc8c0 a2=0 a3=7fff9bbbc8ac items=0 ppid=2559 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.607000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:35:20.611000 audit[2638]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2638 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.611000 audit[2638]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffda2dcdae0 a2=0 a3=7ffda2dcdacc items=0 ppid=2559 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.611000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:35:20.613000 audit[2639]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2639 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.613000 audit[2639]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9e6ecf50 a2=0 a3=7ffe9e6ecf3c items=0 ppid=2559 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.613000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:35:20.615000 audit[2641]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2641 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.615000 audit[2641]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff63a25f50 a2=0 a3=7fff63a25f3c items=0 ppid=2559 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.615000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:35:20.616000 audit[2642]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2642 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.616000 audit[2642]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc1d2b2b0 a2=0 a3=7ffcc1d2b29c items=0 ppid=2559 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.616000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:35:20.619000 audit[2644]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2644 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.619000 audit[2644]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffb1917d90 a2=0 a3=7fffb1917d7c items=0 ppid=2559 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.619000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:35:20.622000 audit[2647]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2647 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.622000 audit[2647]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffde2fc5cd0 a2=0 a3=7ffde2fc5cbc items=0 ppid=2559 pid=2647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.622000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:35:20.623000 audit[2648]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2648 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.623000 audit[2648]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd3a1e3f0 a2=0 a3=7ffdd3a1e3dc items=0 ppid=2559 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.623000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:35:20.626000 audit[2650]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2650 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.626000 audit[2650]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeecedd200 a2=0 a3=7ffeecedd1ec items=0 ppid=2559 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.626000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:35:20.627000 audit[2651]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2651 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.627000 audit[2651]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe020f9120 a2=0 a3=7ffe020f910c items=0 ppid=2559 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.627000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:35:20.630000 audit[2653]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2653 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.630000 audit[2653]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe526f7c00 a2=0 a3=7ffe526f7bec items=0 ppid=2559 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:35:20.633000 audit[2656]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2656 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.633000 audit[2656]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffecde19a0 a2=0 a3=7fffecde198c items=0 ppid=2559 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.633000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:35:20.637000 audit[2659]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2659 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.637000 audit[2659]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd043920d0 a2=0 a3=7ffd043920bc items=0 ppid=2559 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.637000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:35:20.638000 audit[2660]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2660 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.638000 audit[2660]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff52e49400 a2=0 a3=7fff52e493ec items=0 ppid=2559 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.638000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:35:20.640000 audit[2662]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2662 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.640000 audit[2662]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff35ad2940 a2=0 a3=7fff35ad292c items=0 ppid=2559 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.640000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:35:20.644000 audit[2665]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2665 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.644000 audit[2665]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe5e61f180 a2=0 a3=7ffe5e61f16c items=0 ppid=2559 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.644000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:35:20.645000 audit[2666]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2666 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.645000 audit[2666]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc7623a20 a2=0 a3=7fffc7623a0c items=0 ppid=2559 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.645000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:35:20.647000 audit[2668]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2668 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:35:20.647000 audit[2668]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe84c417c0 a2=0 a3=7ffe84c417ac items=0 ppid=2559 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.647000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:35:20.728000 audit[2674]: NETFILTER_CFG table=filter:66 family=2 entries=8 op=nft_register_rule pid=2674 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:20.728000 audit[2674]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe24616700 a2=0 a3=7ffe246166ec items=0 ppid=2559 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.728000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:20.753000 audit[2674]: NETFILTER_CFG table=nat:67 family=2 entries=14 op=nft_register_chain pid=2674 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:20.753000 audit[2674]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffe24616700 a2=0 a3=7ffe246166ec items=0 ppid=2559 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.753000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:20.754000 audit[2679]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2679 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.754000 audit[2679]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcfdbb49f0 a2=0 a3=7ffcfdbb49dc items=0 ppid=2559 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.754000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:35:20.758000 audit[2681]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2681 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.758000 audit[2681]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcd7612340 a2=0 a3=7ffcd761232c items=0 ppid=2559 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.758000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:35:20.763000 audit[2684]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2684 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.763000 audit[2684]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff9051ee90 a2=0 a3=7fff9051ee7c items=0 ppid=2559 pid=2684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.763000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:35:20.764000 audit[2685]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2685 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.764000 audit[2685]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6c8eb380 a2=0 a3=7ffd6c8eb36c items=0 ppid=2559 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.764000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:35:20.767000 audit[2687]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2687 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.767000 audit[2687]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd359a020 a2=0 a3=7fffd359a00c items=0 ppid=2559 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.767000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:35:20.768000 audit[2688]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2688 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.768000 audit[2688]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed858c3a0 a2=0 a3=7ffed858c38c items=0 ppid=2559 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.768000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:35:20.771000 audit[2690]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2690 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.771000 audit[2690]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcec3b15e0 a2=0 a3=7ffcec3b15cc items=0 ppid=2559 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.771000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:35:20.776000 audit[2693]: NETFILTER_CFG table=filter:75 family=10 entries=2 op=nft_register_chain pid=2693 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.776000 audit[2693]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc890f2890 a2=0 a3=7ffc890f287c items=0 ppid=2559 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.776000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:35:20.777000 audit[2694]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2694 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.777000 audit[2694]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc15460310 a2=0 a3=7ffc154602fc items=0 ppid=2559 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.777000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:35:20.779000 audit[2696]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2696 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.779000 audit[2696]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd0a3d7ff0 a2=0 a3=7ffd0a3d7fdc items=0 ppid=2559 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.779000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:35:20.781000 audit[2697]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2697 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.781000 audit[2697]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9844e1e0 a2=0 a3=7fff9844e1cc items=0 ppid=2559 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.781000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:35:20.783000 audit[2699]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2699 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.783000 audit[2699]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe5d9831b0 a2=0 a3=7ffe5d98319c items=0 ppid=2559 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.783000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:35:20.787000 audit[2702]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2702 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.787000 audit[2702]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd79250a20 a2=0 a3=7ffd79250a0c items=0 ppid=2559 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.787000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:35:20.790000 audit[2705]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2705 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.790000 audit[2705]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd53ab3a0 a2=0 a3=7ffdd53ab38c items=0 ppid=2559 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.790000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:35:20.792000 audit[2706]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2706 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.792000 audit[2706]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffea9c725d0 a2=0 a3=7ffea9c725bc items=0 ppid=2559 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.792000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:35:20.796000 audit[2708]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.796000 audit[2708]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd1769ee60 a2=0 a3=7ffd1769ee4c items=0 ppid=2559 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.796000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:35:20.800000 audit[2711]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.800000 audit[2711]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff84245540 a2=0 a3=7fff8424552c items=0 ppid=2559 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.800000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:35:20.801000 audit[2712]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.801000 audit[2712]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc248ba450 a2=0 a3=7ffc248ba43c items=0 ppid=2559 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.801000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:35:20.803000 audit[2714]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2714 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.803000 audit[2714]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdd257a490 a2=0 a3=7ffdd257a47c items=0 ppid=2559 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.803000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:35:20.804000 audit[2715]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2715 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.804000 audit[2715]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9d17f290 a2=0 a3=7fff9d17f27c items=0 ppid=2559 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.804000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:35:20.807000 audit[2717]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.807000 audit[2717]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcabf28ce0 a2=0 a3=7ffcabf28ccc items=0 ppid=2559 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.807000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:35:20.810000 audit[2720]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:35:20.810000 audit[2720]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcd435a4e0 a2=0 a3=7ffcd435a4cc items=0 ppid=2559 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.810000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:35:20.816850 systemd[1]: run-containerd-runc-k8s.io-5c855ac51255858ab52425954a7613651a7ee249b9e238a330bcec0c735bbbe1-runc.rY55f5.mount: Deactivated successfully. May 17 00:35:20.821000 audit[2722]: NETFILTER_CFG table=filter:90 family=10 entries=3 op=nft_register_rule pid=2722 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:35:20.821000 audit[2722]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffc508dfbd0 a2=0 a3=7ffc508dfbbc items=0 ppid=2559 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.821000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:20.822000 audit[2722]: NETFILTER_CFG table=nat:91 family=10 entries=7 op=nft_register_chain pid=2722 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:35:20.822000 audit[2722]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc508dfbd0 a2=0 a3=7ffc508dfbbc items=0 ppid=2559 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:20.822000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:22.040110 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3825482235.mount: Deactivated successfully. May 17 00:35:22.968353 env[1435]: time="2025-05-17T00:35:22.968289625Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:22.975338 env[1435]: time="2025-05-17T00:35:22.975297650Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:22.979627 env[1435]: time="2025-05-17T00:35:22.979596911Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:22.983570 env[1435]: time="2025-05-17T00:35:22.983535450Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:22.984110 env[1435]: time="2025-05-17T00:35:22.984077983Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\" returns image reference \"sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033\"" May 17 00:35:22.991322 env[1435]: time="2025-05-17T00:35:22.991295020Z" level=info msg="CreateContainer within sandbox \"d1979131577eb1514c5d39c8141ddc9af48b89875bff7b61d58809858942bf29\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 17 00:35:23.015282 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount667477596.mount: Deactivated successfully. May 17 00:35:23.030671 env[1435]: time="2025-05-17T00:35:23.030626257Z" level=info msg="CreateContainer within sandbox \"d1979131577eb1514c5d39c8141ddc9af48b89875bff7b61d58809858942bf29\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"5b18b5d54c9e5bbba7908f1d8ce577b6806f29de88091f3140ff8d94c2a1e473\"" May 17 00:35:23.033704 env[1435]: time="2025-05-17T00:35:23.031349700Z" level=info msg="StartContainer for \"5b18b5d54c9e5bbba7908f1d8ce577b6806f29de88091f3140ff8d94c2a1e473\"" May 17 00:35:23.056441 systemd[1]: Started cri-containerd-5b18b5d54c9e5bbba7908f1d8ce577b6806f29de88091f3140ff8d94c2a1e473.scope. May 17 00:35:23.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.068000 audit: BPF prog-id=118 op=LOAD May 17 00:35:23.069000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2521 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562313862356435346339653562626261373930386631643863653537 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2521 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562313862356435346339653562626261373930386631643863653537 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit: BPF prog-id=119 op=LOAD May 17 00:35:23.069000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a59b0 items=0 ppid=2521 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562313862356435346339653562626261373930386631643863653537 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit: BPF prog-id=120 op=LOAD May 17 00:35:23.069000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a59f8 items=0 ppid=2521 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562313862356435346339653562626261373930386631643863653537 May 17 00:35:23.069000 audit: BPF prog-id=120 op=UNLOAD May 17 00:35:23.069000 audit: BPF prog-id=119 op=UNLOAD May 17 00:35:23.069000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { perfmon } for pid=2731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit[2731]: AVC avc: denied { bpf } for pid=2731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:23.069000 audit: BPF prog-id=121 op=LOAD May 17 00:35:23.069000 audit[2731]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a5e08 items=0 ppid=2521 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:23.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562313862356435346339653562626261373930386631643863653537 May 17 00:35:23.095743 env[1435]: time="2025-05-17T00:35:23.095691898Z" level=info msg="StartContainer for \"5b18b5d54c9e5bbba7908f1d8ce577b6806f29de88091f3140ff8d94c2a1e473\" returns successfully" May 17 00:35:24.058188 kubelet[2423]: I0517 00:35:24.058132 2423 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-rvsrr" podStartSLOduration=5.05811511 podStartE2EDuration="5.05811511s" podCreationTimestamp="2025-05-17 00:35:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:35:21.060866843 +0000 UTC m=+7.211898418" watchObservedRunningTime="2025-05-17 00:35:24.05811511 +0000 UTC m=+10.209146685" May 17 00:35:24.058881 kubelet[2423]: I0517 00:35:24.058812 2423 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-844669ff44-qzv5v" podStartSLOduration=2.455415799 podStartE2EDuration="5.058798649s" podCreationTimestamp="2025-05-17 00:35:19 +0000 UTC" firstStartedPulling="2025-05-17 00:35:20.381632389 +0000 UTC m=+6.532663964" lastFinishedPulling="2025-05-17 00:35:22.985015239 +0000 UTC m=+9.136046814" observedRunningTime="2025-05-17 00:35:24.057849194 +0000 UTC m=+10.208880869" watchObservedRunningTime="2025-05-17 00:35:24.058798649 +0000 UTC m=+10.209830324" May 17 00:35:27.464760 sudo[1749]: pam_unix(sudo:session): session closed for user root May 17 00:35:27.463000 audit[1749]: USER_END pid=1749 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:35:27.470021 kernel: kauditd_printk_skb: 357 callbacks suppressed May 17 00:35:27.470106 kernel: audit: type=1106 audit(1747442127.463:936): pid=1749 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:35:27.463000 audit[1749]: CRED_DISP pid=1749 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:35:27.513408 kernel: audit: type=1104 audit(1747442127.463:937): pid=1749 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:35:27.559961 sshd[1746]: pam_unix(sshd:session): session closed for user core May 17 00:35:27.560000 audit[1746]: USER_END pid=1746 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:35:27.582865 kernel: audit: type=1106 audit(1747442127.560:938): pid=1746 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:35:27.583258 systemd[1]: sshd@6-10.200.4.40:22-10.200.16.10:35810.service: Deactivated successfully. May 17 00:35:27.584204 systemd[1]: session-9.scope: Deactivated successfully. May 17 00:35:27.584404 systemd[1]: session-9.scope: Consumed 5.297s CPU time. May 17 00:35:27.585530 systemd-logind[1425]: Session 9 logged out. Waiting for processes to exit. May 17 00:35:27.586856 systemd-logind[1425]: Removed session 9. May 17 00:35:27.580000 audit[1746]: CRED_DISP pid=1746 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:35:27.605462 kernel: audit: type=1104 audit(1747442127.580:939): pid=1746 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:35:27.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.40:22-10.200.16.10:35810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:27.622417 kernel: audit: type=1131 audit(1747442127.582:940): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.40:22-10.200.16.10:35810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:28.212000 audit[2807]: NETFILTER_CFG table=filter:92 family=2 entries=15 op=nft_register_rule pid=2807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:28.224448 kernel: audit: type=1325 audit(1747442128.212:941): table=filter:92 family=2 entries=15 op=nft_register_rule pid=2807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:28.212000 audit[2807]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe2280a470 a2=0 a3=7ffe2280a45c items=0 ppid=2559 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:28.248415 kernel: audit: type=1300 audit(1747442128.212:941): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe2280a470 a2=0 a3=7ffe2280a45c items=0 ppid=2559 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:28.212000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:28.265405 kernel: audit: type=1327 audit(1747442128.212:941): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:28.265000 audit[2807]: NETFILTER_CFG table=nat:93 family=2 entries=12 op=nft_register_rule pid=2807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:28.278418 kernel: audit: type=1325 audit(1747442128.265:942): table=nat:93 family=2 entries=12 op=nft_register_rule pid=2807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:28.265000 audit[2807]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe2280a470 a2=0 a3=0 items=0 ppid=2559 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:28.300438 kernel: audit: type=1300 audit(1747442128.265:942): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe2280a470 a2=0 a3=0 items=0 ppid=2559 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:28.265000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:28.348000 audit[2810]: NETFILTER_CFG table=filter:94 family=2 entries=16 op=nft_register_rule pid=2810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:28.348000 audit[2810]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcb4ee7b90 a2=0 a3=7ffcb4ee7b7c items=0 ppid=2559 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:28.348000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:28.352000 audit[2810]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:28.352000 audit[2810]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcb4ee7b90 a2=0 a3=0 items=0 ppid=2559 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:28.352000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:31.075000 audit[2814]: NETFILTER_CFG table=filter:96 family=2 entries=16 op=nft_register_rule pid=2814 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:31.093254 systemd[1]: Created slice kubepods-besteffort-pod7aceece0_737f_491e_a7a9_7d5df27e1550.slice. May 17 00:35:31.075000 audit[2814]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffca874acf0 a2=0 a3=7ffca874acdc items=0 ppid=2559 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.075000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:31.095000 audit[2814]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=2814 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:31.095000 audit[2814]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffca874acf0 a2=0 a3=0 items=0 ppid=2559 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.095000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:31.162000 audit[2816]: NETFILTER_CFG table=filter:98 family=2 entries=17 op=nft_register_rule pid=2816 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:31.162000 audit[2816]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffe0cdbcc60 a2=0 a3=7ffe0cdbcc4c items=0 ppid=2559 pid=2816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.162000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:31.168000 audit[2816]: NETFILTER_CFG table=nat:99 family=2 entries=12 op=nft_register_rule pid=2816 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:31.168000 audit[2816]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe0cdbcc60 a2=0 a3=0 items=0 ppid=2559 pid=2816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.168000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:31.220907 kubelet[2423]: I0517 00:35:31.220853 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q59wf\" (UniqueName: \"kubernetes.io/projected/7aceece0-737f-491e-a7a9-7d5df27e1550-kube-api-access-q59wf\") pod \"calico-typha-84fcdd4fb7-2qgrr\" (UID: \"7aceece0-737f-491e-a7a9-7d5df27e1550\") " pod="calico-system/calico-typha-84fcdd4fb7-2qgrr" May 17 00:35:31.220907 kubelet[2423]: I0517 00:35:31.220912 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7aceece0-737f-491e-a7a9-7d5df27e1550-tigera-ca-bundle\") pod \"calico-typha-84fcdd4fb7-2qgrr\" (UID: \"7aceece0-737f-491e-a7a9-7d5df27e1550\") " pod="calico-system/calico-typha-84fcdd4fb7-2qgrr" May 17 00:35:31.221441 kubelet[2423]: I0517 00:35:31.220937 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/7aceece0-737f-491e-a7a9-7d5df27e1550-typha-certs\") pod \"calico-typha-84fcdd4fb7-2qgrr\" (UID: \"7aceece0-737f-491e-a7a9-7d5df27e1550\") " pod="calico-system/calico-typha-84fcdd4fb7-2qgrr" May 17 00:35:31.373288 systemd[1]: Created slice kubepods-besteffort-pod281eb937_8df4_4a89_8f88_253225a3bb65.slice. May 17 00:35:31.396663 env[1435]: time="2025-05-17T00:35:31.396611585Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-84fcdd4fb7-2qgrr,Uid:7aceece0-737f-491e-a7a9-7d5df27e1550,Namespace:calico-system,Attempt:0,}" May 17 00:35:31.422790 kubelet[2423]: I0517 00:35:31.422747 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/281eb937-8df4-4a89-8f88-253225a3bb65-cni-net-dir\") pod \"calico-node-gtmbp\" (UID: \"281eb937-8df4-4a89-8f88-253225a3bb65\") " pod="calico-system/calico-node-gtmbp" May 17 00:35:31.423010 kubelet[2423]: I0517 00:35:31.422996 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/281eb937-8df4-4a89-8f88-253225a3bb65-node-certs\") pod \"calico-node-gtmbp\" (UID: \"281eb937-8df4-4a89-8f88-253225a3bb65\") " pod="calico-system/calico-node-gtmbp" May 17 00:35:31.423091 kubelet[2423]: I0517 00:35:31.423080 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/281eb937-8df4-4a89-8f88-253225a3bb65-xtables-lock\") pod \"calico-node-gtmbp\" (UID: \"281eb937-8df4-4a89-8f88-253225a3bb65\") " pod="calico-system/calico-node-gtmbp" May 17 00:35:31.423160 kubelet[2423]: I0517 00:35:31.423149 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/281eb937-8df4-4a89-8f88-253225a3bb65-var-lib-calico\") pod \"calico-node-gtmbp\" (UID: \"281eb937-8df4-4a89-8f88-253225a3bb65\") " pod="calico-system/calico-node-gtmbp" May 17 00:35:31.423216 kubelet[2423]: I0517 00:35:31.423207 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/281eb937-8df4-4a89-8f88-253225a3bb65-lib-modules\") pod \"calico-node-gtmbp\" (UID: \"281eb937-8df4-4a89-8f88-253225a3bb65\") " pod="calico-system/calico-node-gtmbp" May 17 00:35:31.423272 kubelet[2423]: I0517 00:35:31.423263 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/281eb937-8df4-4a89-8f88-253225a3bb65-tigera-ca-bundle\") pod \"calico-node-gtmbp\" (UID: \"281eb937-8df4-4a89-8f88-253225a3bb65\") " pod="calico-system/calico-node-gtmbp" May 17 00:35:31.423336 kubelet[2423]: I0517 00:35:31.423327 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/281eb937-8df4-4a89-8f88-253225a3bb65-var-run-calico\") pod \"calico-node-gtmbp\" (UID: \"281eb937-8df4-4a89-8f88-253225a3bb65\") " pod="calico-system/calico-node-gtmbp" May 17 00:35:31.423410 kubelet[2423]: I0517 00:35:31.423398 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/281eb937-8df4-4a89-8f88-253225a3bb65-cni-bin-dir\") pod \"calico-node-gtmbp\" (UID: \"281eb937-8df4-4a89-8f88-253225a3bb65\") " pod="calico-system/calico-node-gtmbp" May 17 00:35:31.423492 kubelet[2423]: I0517 00:35:31.423480 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/281eb937-8df4-4a89-8f88-253225a3bb65-cni-log-dir\") pod \"calico-node-gtmbp\" (UID: \"281eb937-8df4-4a89-8f88-253225a3bb65\") " pod="calico-system/calico-node-gtmbp" May 17 00:35:31.423565 kubelet[2423]: I0517 00:35:31.423545 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/281eb937-8df4-4a89-8f88-253225a3bb65-policysync\") pod \"calico-node-gtmbp\" (UID: \"281eb937-8df4-4a89-8f88-253225a3bb65\") " pod="calico-system/calico-node-gtmbp" May 17 00:35:31.423633 kubelet[2423]: I0517 00:35:31.423620 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/281eb937-8df4-4a89-8f88-253225a3bb65-flexvol-driver-host\") pod \"calico-node-gtmbp\" (UID: \"281eb937-8df4-4a89-8f88-253225a3bb65\") " pod="calico-system/calico-node-gtmbp" May 17 00:35:31.423696 kubelet[2423]: I0517 00:35:31.423687 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bfq4h\" (UniqueName: \"kubernetes.io/projected/281eb937-8df4-4a89-8f88-253225a3bb65-kube-api-access-bfq4h\") pod \"calico-node-gtmbp\" (UID: \"281eb937-8df4-4a89-8f88-253225a3bb65\") " pod="calico-system/calico-node-gtmbp" May 17 00:35:31.446189 env[1435]: time="2025-05-17T00:35:31.446125356Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:35:31.446381 env[1435]: time="2025-05-17T00:35:31.446194159Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:35:31.446381 env[1435]: time="2025-05-17T00:35:31.446220661Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:35:31.446381 env[1435]: time="2025-05-17T00:35:31.446361367Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/adfbfcca04d9f9f4d8715ad4b65f07c8aae7faac7f89d3a886cea62e12abde55 pid=2826 runtime=io.containerd.runc.v2 May 17 00:35:31.474335 systemd[1]: Started cri-containerd-adfbfcca04d9f9f4d8715ad4b65f07c8aae7faac7f89d3a886cea62e12abde55.scope. May 17 00:35:31.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.505000 audit: BPF prog-id=122 op=LOAD May 17 00:35:31.506000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.506000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2826 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164666266636361303464396639663464383731356164346236356630 May 17 00:35:31.506000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.506000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2826 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164666266636361303464396639663464383731356164346236356630 May 17 00:35:31.506000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.506000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.506000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.506000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.506000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.506000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.506000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.506000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.506000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.506000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.506000 audit: BPF prog-id=123 op=LOAD May 17 00:35:31.506000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000d3cd0 items=0 ppid=2826 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164666266636361303464396639663464383731356164346236356630 May 17 00:35:31.507000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.507000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.507000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.507000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.507000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.507000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.507000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.507000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.507000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.507000 audit: BPF prog-id=124 op=LOAD May 17 00:35:31.507000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000d3d18 items=0 ppid=2826 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164666266636361303464396639663464383731356164346236356630 May 17 00:35:31.507000 audit: BPF prog-id=124 op=UNLOAD May 17 00:35:31.507000 audit: BPF prog-id=123 op=UNLOAD May 17 00:35:31.507000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.507000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.507000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.507000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.507000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.507000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.507000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.507000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.507000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.507000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.507000 audit: BPF prog-id=125 op=LOAD May 17 00:35:31.507000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000360128 items=0 ppid=2826 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164666266636361303464396639663464383731356164346236356630 May 17 00:35:31.530111 kubelet[2423]: E0517 00:35:31.530083 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.530278 kubelet[2423]: W0517 00:35:31.530265 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.531842 kubelet[2423]: E0517 00:35:31.531815 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.535741 kubelet[2423]: E0517 00:35:31.535718 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.535844 kubelet[2423]: W0517 00:35:31.535748 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.535844 kubelet[2423]: E0517 00:35:31.535769 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.549819 env[1435]: time="2025-05-17T00:35:31.549752918Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-84fcdd4fb7-2qgrr,Uid:7aceece0-737f-491e-a7a9-7d5df27e1550,Namespace:calico-system,Attempt:0,} returns sandbox id \"adfbfcca04d9f9f4d8715ad4b65f07c8aae7faac7f89d3a886cea62e12abde55\"" May 17 00:35:31.551975 env[1435]: time="2025-05-17T00:35:31.551932923Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\"" May 17 00:35:31.650952 kubelet[2423]: E0517 00:35:31.650827 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wk56l" podUID="15b079d6-0080-4890-bd00-77adf92b4b29" May 17 00:35:31.683268 kubelet[2423]: E0517 00:35:31.683212 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.683268 kubelet[2423]: W0517 00:35:31.683239 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.683268 kubelet[2423]: E0517 00:35:31.683266 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.683579 kubelet[2423]: E0517 00:35:31.683518 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.683579 kubelet[2423]: W0517 00:35:31.683530 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.683579 kubelet[2423]: E0517 00:35:31.683544 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.683767 kubelet[2423]: E0517 00:35:31.683750 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.683767 kubelet[2423]: W0517 00:35:31.683766 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.683886 kubelet[2423]: E0517 00:35:31.683778 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.684085 kubelet[2423]: E0517 00:35:31.684061 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.684168 kubelet[2423]: W0517 00:35:31.684087 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.684168 kubelet[2423]: E0517 00:35:31.684101 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.684344 kubelet[2423]: E0517 00:35:31.684326 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.684344 kubelet[2423]: W0517 00:35:31.684343 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.684488 kubelet[2423]: E0517 00:35:31.684363 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.684598 kubelet[2423]: E0517 00:35:31.684578 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.684598 kubelet[2423]: W0517 00:35:31.684597 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.684709 kubelet[2423]: E0517 00:35:31.684617 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.684846 kubelet[2423]: E0517 00:35:31.684821 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.684904 kubelet[2423]: W0517 00:35:31.684844 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.684904 kubelet[2423]: E0517 00:35:31.684865 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.685138 kubelet[2423]: E0517 00:35:31.685105 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.685138 kubelet[2423]: W0517 00:35:31.685137 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.685239 kubelet[2423]: E0517 00:35:31.685149 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.685402 kubelet[2423]: E0517 00:35:31.685366 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.685402 kubelet[2423]: W0517 00:35:31.685401 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.685540 kubelet[2423]: E0517 00:35:31.685418 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.685640 kubelet[2423]: E0517 00:35:31.685624 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.685640 kubelet[2423]: W0517 00:35:31.685640 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.685742 kubelet[2423]: E0517 00:35:31.685652 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.685874 kubelet[2423]: E0517 00:35:31.685853 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.685874 kubelet[2423]: W0517 00:35:31.685874 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.685993 kubelet[2423]: E0517 00:35:31.685893 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.686122 kubelet[2423]: E0517 00:35:31.686098 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.686122 kubelet[2423]: W0517 00:35:31.686120 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.686226 kubelet[2423]: E0517 00:35:31.686133 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.686361 kubelet[2423]: E0517 00:35:31.686343 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.686442 kubelet[2423]: W0517 00:35:31.686359 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.686442 kubelet[2423]: E0517 00:35:31.686382 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.686601 kubelet[2423]: E0517 00:35:31.686584 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.686601 kubelet[2423]: W0517 00:35:31.686600 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.686695 kubelet[2423]: E0517 00:35:31.686613 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.686824 kubelet[2423]: E0517 00:35:31.686806 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.686824 kubelet[2423]: W0517 00:35:31.686823 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.686946 kubelet[2423]: E0517 00:35:31.686836 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.687026 kubelet[2423]: E0517 00:35:31.687011 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.687079 kubelet[2423]: W0517 00:35:31.687026 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.687079 kubelet[2423]: E0517 00:35:31.687039 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.687261 kubelet[2423]: E0517 00:35:31.687244 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.687261 kubelet[2423]: W0517 00:35:31.687261 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.687385 kubelet[2423]: E0517 00:35:31.687274 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.687501 kubelet[2423]: E0517 00:35:31.687467 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.687501 kubelet[2423]: W0517 00:35:31.687483 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.687501 kubelet[2423]: E0517 00:35:31.687495 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.687697 kubelet[2423]: E0517 00:35:31.687666 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.687697 kubelet[2423]: W0517 00:35:31.687682 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.687697 kubelet[2423]: E0517 00:35:31.687694 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.687904 kubelet[2423]: E0517 00:35:31.687887 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.687963 kubelet[2423]: W0517 00:35:31.687905 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.687963 kubelet[2423]: E0517 00:35:31.687918 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.688306 env[1435]: time="2025-05-17T00:35:31.688256051Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gtmbp,Uid:281eb937-8df4-4a89-8f88-253225a3bb65,Namespace:calico-system,Attempt:0,}" May 17 00:35:31.727024 kubelet[2423]: E0517 00:35:31.726995 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.727024 kubelet[2423]: W0517 00:35:31.727017 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.727253 kubelet[2423]: E0517 00:35:31.727039 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.727253 kubelet[2423]: I0517 00:35:31.727072 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/15b079d6-0080-4890-bd00-77adf92b4b29-registration-dir\") pod \"csi-node-driver-wk56l\" (UID: \"15b079d6-0080-4890-bd00-77adf92b4b29\") " pod="calico-system/csi-node-driver-wk56l" May 17 00:35:31.727482 kubelet[2423]: E0517 00:35:31.727456 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.727482 kubelet[2423]: W0517 00:35:31.727471 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.727610 kubelet[2423]: E0517 00:35:31.727487 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.727610 kubelet[2423]: I0517 00:35:31.727517 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/15b079d6-0080-4890-bd00-77adf92b4b29-varrun\") pod \"csi-node-driver-wk56l\" (UID: \"15b079d6-0080-4890-bd00-77adf92b4b29\") " pod="calico-system/csi-node-driver-wk56l" May 17 00:35:31.728033 kubelet[2423]: E0517 00:35:31.728012 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.728033 kubelet[2423]: W0517 00:35:31.728028 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.728163 kubelet[2423]: E0517 00:35:31.728043 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.728163 kubelet[2423]: I0517 00:35:31.728071 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5dbsf\" (UniqueName: \"kubernetes.io/projected/15b079d6-0080-4890-bd00-77adf92b4b29-kube-api-access-5dbsf\") pod \"csi-node-driver-wk56l\" (UID: \"15b079d6-0080-4890-bd00-77adf92b4b29\") " pod="calico-system/csi-node-driver-wk56l" May 17 00:35:31.728422 kubelet[2423]: E0517 00:35:31.728370 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.728422 kubelet[2423]: W0517 00:35:31.728383 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.728422 kubelet[2423]: E0517 00:35:31.728413 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.728615 kubelet[2423]: I0517 00:35:31.728588 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/15b079d6-0080-4890-bd00-77adf92b4b29-kubelet-dir\") pod \"csi-node-driver-wk56l\" (UID: \"15b079d6-0080-4890-bd00-77adf92b4b29\") " pod="calico-system/csi-node-driver-wk56l" May 17 00:35:31.728758 kubelet[2423]: E0517 00:35:31.728742 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.728758 kubelet[2423]: W0517 00:35:31.728754 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.728878 kubelet[2423]: E0517 00:35:31.728768 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.729037 kubelet[2423]: E0517 00:35:31.729021 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.729037 kubelet[2423]: W0517 00:35:31.729034 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.729143 kubelet[2423]: E0517 00:35:31.729047 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.729328 kubelet[2423]: E0517 00:35:31.729310 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.729328 kubelet[2423]: W0517 00:35:31.729323 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.729512 kubelet[2423]: E0517 00:35:31.729338 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.729567 kubelet[2423]: E0517 00:35:31.729555 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.729567 kubelet[2423]: W0517 00:35:31.729565 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.729645 kubelet[2423]: E0517 00:35:31.729577 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.729645 kubelet[2423]: I0517 00:35:31.729608 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/15b079d6-0080-4890-bd00-77adf92b4b29-socket-dir\") pod \"csi-node-driver-wk56l\" (UID: \"15b079d6-0080-4890-bd00-77adf92b4b29\") " pod="calico-system/csi-node-driver-wk56l" May 17 00:35:31.729841 kubelet[2423]: E0517 00:35:31.729819 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.729918 kubelet[2423]: W0517 00:35:31.729893 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.729918 kubelet[2423]: E0517 00:35:31.729910 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.730114 kubelet[2423]: E0517 00:35:31.730099 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.730189 kubelet[2423]: W0517 00:35:31.730110 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.730189 kubelet[2423]: E0517 00:35:31.730135 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.730426 kubelet[2423]: E0517 00:35:31.730412 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.730426 kubelet[2423]: W0517 00:35:31.730427 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.730602 kubelet[2423]: E0517 00:35:31.730441 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.730669 kubelet[2423]: E0517 00:35:31.730658 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.730715 kubelet[2423]: W0517 00:35:31.730669 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.730715 kubelet[2423]: E0517 00:35:31.730682 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.730932 kubelet[2423]: E0517 00:35:31.730902 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.730932 kubelet[2423]: W0517 00:35:31.730916 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.731046 kubelet[2423]: E0517 00:35:31.730928 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.731213 kubelet[2423]: E0517 00:35:31.731198 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.731213 kubelet[2423]: W0517 00:35:31.731211 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.731339 kubelet[2423]: E0517 00:35:31.731224 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.731504 kubelet[2423]: E0517 00:35:31.731488 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.731568 kubelet[2423]: W0517 00:35:31.731501 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.731568 kubelet[2423]: E0517 00:35:31.731522 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.752926 env[1435]: time="2025-05-17T00:35:31.752845343Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:35:31.753200 env[1435]: time="2025-05-17T00:35:31.753133857Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:35:31.753200 env[1435]: time="2025-05-17T00:35:31.753157658Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:35:31.754314 env[1435]: time="2025-05-17T00:35:31.753540777Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/80afade07bc2573dd5190b2375cd0652016933e7ceb09926c3783dc469b37f44 pid=2905 runtime=io.containerd.runc.v2 May 17 00:35:31.773093 systemd[1]: Started cri-containerd-80afade07bc2573dd5190b2375cd0652016933e7ceb09926c3783dc469b37f44.scope. May 17 00:35:31.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.803000 audit: BPF prog-id=126 op=LOAD May 17 00:35:31.804000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.804000 audit[2914]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2905 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830616661646530376263323537336464353139306232333735636430 May 17 00:35:31.804000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.804000 audit[2914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2905 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830616661646530376263323537336464353139306232333735636430 May 17 00:35:31.804000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.804000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.804000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.804000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.804000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.804000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.804000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.804000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.804000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.804000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.804000 audit: BPF prog-id=127 op=LOAD May 17 00:35:31.804000 audit[2914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024690 items=0 ppid=2905 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830616661646530376263323537336464353139306232333735636430 May 17 00:35:31.804000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.804000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.804000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.804000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.804000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.804000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.804000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.804000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.804000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.804000 audit: BPF prog-id=128 op=LOAD May 17 00:35:31.804000 audit[2914]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000246d8 items=0 ppid=2905 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830616661646530376263323537336464353139306232333735636430 May 17 00:35:31.804000 audit: BPF prog-id=128 op=UNLOAD May 17 00:35:31.805000 audit: BPF prog-id=127 op=UNLOAD May 17 00:35:31.805000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.805000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.805000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.805000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.805000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.805000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.805000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.805000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.805000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.805000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:31.805000 audit: BPF prog-id=129 op=LOAD May 17 00:35:31.805000 audit[2914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024ae8 items=0 ppid=2905 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:31.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830616661646530376263323537336464353139306232333735636430 May 17 00:35:31.827946 env[1435]: time="2025-05-17T00:35:31.827897937Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gtmbp,Uid:281eb937-8df4-4a89-8f88-253225a3bb65,Namespace:calico-system,Attempt:0,} returns sandbox id \"80afade07bc2573dd5190b2375cd0652016933e7ceb09926c3783dc469b37f44\"" May 17 00:35:31.832233 kubelet[2423]: E0517 00:35:31.831817 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.832233 kubelet[2423]: W0517 00:35:31.831844 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.832233 kubelet[2423]: E0517 00:35:31.831866 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.832233 kubelet[2423]: E0517 00:35:31.832184 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.832233 kubelet[2423]: W0517 00:35:31.832197 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.832233 kubelet[2423]: E0517 00:35:31.832213 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.832673 kubelet[2423]: E0517 00:35:31.832539 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.832673 kubelet[2423]: W0517 00:35:31.832564 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.832673 kubelet[2423]: E0517 00:35:31.832578 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.835756 kubelet[2423]: E0517 00:35:31.832846 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.835756 kubelet[2423]: W0517 00:35:31.832867 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.835756 kubelet[2423]: E0517 00:35:31.832880 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.835756 kubelet[2423]: E0517 00:35:31.833149 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.835756 kubelet[2423]: W0517 00:35:31.833160 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.835756 kubelet[2423]: E0517 00:35:31.833173 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.835756 kubelet[2423]: E0517 00:35:31.833463 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.835756 kubelet[2423]: W0517 00:35:31.833482 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.835756 kubelet[2423]: E0517 00:35:31.833496 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.835756 kubelet[2423]: E0517 00:35:31.833742 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.836300 kubelet[2423]: W0517 00:35:31.833762 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.836300 kubelet[2423]: E0517 00:35:31.833775 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.836300 kubelet[2423]: E0517 00:35:31.834007 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.836300 kubelet[2423]: W0517 00:35:31.834018 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.836300 kubelet[2423]: E0517 00:35:31.834039 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.836300 kubelet[2423]: E0517 00:35:31.834256 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.836300 kubelet[2423]: W0517 00:35:31.834267 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.836300 kubelet[2423]: E0517 00:35:31.834308 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.836300 kubelet[2423]: E0517 00:35:31.834566 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.836300 kubelet[2423]: W0517 00:35:31.834578 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.836698 kubelet[2423]: E0517 00:35:31.834599 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.836698 kubelet[2423]: E0517 00:35:31.834816 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.836698 kubelet[2423]: W0517 00:35:31.834828 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.836698 kubelet[2423]: E0517 00:35:31.834848 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.836698 kubelet[2423]: E0517 00:35:31.835065 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.836698 kubelet[2423]: W0517 00:35:31.835076 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.836698 kubelet[2423]: E0517 00:35:31.835097 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.836698 kubelet[2423]: E0517 00:35:31.835325 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.836698 kubelet[2423]: W0517 00:35:31.835345 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.836698 kubelet[2423]: E0517 00:35:31.835358 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.837077 kubelet[2423]: E0517 00:35:31.835638 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.837077 kubelet[2423]: W0517 00:35:31.835651 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.837077 kubelet[2423]: E0517 00:35:31.835664 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.837077 kubelet[2423]: E0517 00:35:31.835875 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.837077 kubelet[2423]: W0517 00:35:31.835886 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.837077 kubelet[2423]: E0517 00:35:31.835899 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.837077 kubelet[2423]: E0517 00:35:31.836115 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.837077 kubelet[2423]: W0517 00:35:31.836125 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.837077 kubelet[2423]: E0517 00:35:31.836137 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.837077 kubelet[2423]: E0517 00:35:31.836334 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.837542 kubelet[2423]: W0517 00:35:31.836344 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.837542 kubelet[2423]: E0517 00:35:31.836355 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.840411 kubelet[2423]: E0517 00:35:31.838676 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.840411 kubelet[2423]: W0517 00:35:31.838700 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.840411 kubelet[2423]: E0517 00:35:31.838715 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.840411 kubelet[2423]: E0517 00:35:31.838939 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.840411 kubelet[2423]: W0517 00:35:31.838950 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.840411 kubelet[2423]: E0517 00:35:31.838961 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.840411 kubelet[2423]: E0517 00:35:31.839315 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.840411 kubelet[2423]: W0517 00:35:31.839333 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.840411 kubelet[2423]: E0517 00:35:31.839347 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.840411 kubelet[2423]: E0517 00:35:31.839658 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.840895 kubelet[2423]: W0517 00:35:31.839668 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.840895 kubelet[2423]: E0517 00:35:31.839680 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.840895 kubelet[2423]: E0517 00:35:31.839889 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.840895 kubelet[2423]: W0517 00:35:31.839904 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.840895 kubelet[2423]: E0517 00:35:31.839916 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.840895 kubelet[2423]: E0517 00:35:31.840145 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.840895 kubelet[2423]: W0517 00:35:31.840155 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.840895 kubelet[2423]: E0517 00:35:31.840176 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.840895 kubelet[2423]: E0517 00:35:31.840677 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.840895 kubelet[2423]: W0517 00:35:31.840688 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.841260 kubelet[2423]: E0517 00:35:31.840701 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.841260 kubelet[2423]: E0517 00:35:31.840938 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.841260 kubelet[2423]: W0517 00:35:31.840950 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.841260 kubelet[2423]: E0517 00:35:31.840963 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:31.861584 kubelet[2423]: E0517 00:35:31.861550 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:31.861584 kubelet[2423]: W0517 00:35:31.861575 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:31.861809 kubelet[2423]: E0517 00:35:31.861597 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:32.178000 audit[2965]: NETFILTER_CFG table=filter:100 family=2 entries=20 op=nft_register_rule pid=2965 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:32.178000 audit[2965]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffe0687b790 a2=0 a3=7ffe0687b77c items=0 ppid=2559 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:32.178000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:32.182000 audit[2965]: NETFILTER_CFG table=nat:101 family=2 entries=12 op=nft_register_rule pid=2965 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:32.182000 audit[2965]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe0687b790 a2=0 a3=0 items=0 ppid=2559 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:32.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:32.337203 systemd[1]: run-containerd-runc-k8s.io-adfbfcca04d9f9f4d8715ad4b65f07c8aae7faac7f89d3a886cea62e12abde55-runc.hF9b1R.mount: Deactivated successfully. May 17 00:35:32.970765 kubelet[2423]: E0517 00:35:32.970714 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wk56l" podUID="15b079d6-0080-4890-bd00-77adf92b4b29" May 17 00:35:33.132264 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3718925832.mount: Deactivated successfully. May 17 00:35:34.688931 env[1435]: time="2025-05-17T00:35:34.688872757Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:34.697583 env[1435]: time="2025-05-17T00:35:34.697534041Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:34.703223 env[1435]: time="2025-05-17T00:35:34.703187192Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:34.708614 env[1435]: time="2025-05-17T00:35:34.708576631Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:34.709124 env[1435]: time="2025-05-17T00:35:34.709093354Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\" returns image reference \"sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be\"" May 17 00:35:34.710880 env[1435]: time="2025-05-17T00:35:34.710348710Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:35:34.735641 env[1435]: time="2025-05-17T00:35:34.735602031Z" level=info msg="CreateContainer within sandbox \"adfbfcca04d9f9f4d8715ad4b65f07c8aae7faac7f89d3a886cea62e12abde55\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 17 00:35:34.771989 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3730739041.mount: Deactivated successfully. May 17 00:35:34.799469 env[1435]: time="2025-05-17T00:35:34.799419564Z" level=info msg="CreateContainer within sandbox \"adfbfcca04d9f9f4d8715ad4b65f07c8aae7faac7f89d3a886cea62e12abde55\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"f135467bd4aec798d1124dc39028ca99d041a03850280fc6aa3ebb69ebb8e72a\"" May 17 00:35:34.803602 env[1435]: time="2025-05-17T00:35:34.803568448Z" level=info msg="StartContainer for \"f135467bd4aec798d1124dc39028ca99d041a03850280fc6aa3ebb69ebb8e72a\"" May 17 00:35:34.830782 systemd[1]: Started cri-containerd-f135467bd4aec798d1124dc39028ca99d041a03850280fc6aa3ebb69ebb8e72a.scope. May 17 00:35:34.867893 kernel: kauditd_printk_skb: 139 callbacks suppressed May 17 00:35:34.868036 kernel: audit: type=1400 audit(1747442134.849:987): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.892917 kernel: audit: type=1400 audit(1747442134.849:988): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.892999 kernel: audit: type=1400 audit(1747442134.849:989): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.893028 kernel: audit: type=1400 audit(1747442134.849:990): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.919797 kernel: audit: type=1400 audit(1747442134.849:991): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.945698 kernel: audit: type=1400 audit(1747442134.849:992): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.945815 kernel: audit: type=1400 audit(1747442134.849:993): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.961659 kernel: audit: type=1400 audit(1747442134.849:994): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.978416 kernel: audit: type=1400 audit(1747442134.849:995): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.978711 kubelet[2423]: E0517 00:35:34.978675 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wk56l" podUID="15b079d6-0080-4890-bd00-77adf92b4b29" May 17 00:35:34.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.993411 kernel: audit: type=1400 audit(1747442134.854:996): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.854000 audit: BPF prog-id=130 op=LOAD May 17 00:35:34.854000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.854000 audit[2976]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2826 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:34.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333534363762643461656337393864313132346463333930323863 May 17 00:35:34.854000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.854000 audit[2976]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2826 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:34.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333534363762643461656337393864313132346463333930323863 May 17 00:35:34.854000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.854000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.854000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.854000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.854000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.854000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.854000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.854000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.854000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.854000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.854000 audit: BPF prog-id=131 op=LOAD May 17 00:35:34.854000 audit[2976]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001cafe0 items=0 ppid=2826 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:34.854000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333534363762643461656337393864313132346463333930323863 May 17 00:35:34.867000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.867000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.867000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.867000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.867000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.867000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.867000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.867000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.867000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.867000 audit: BPF prog-id=132 op=LOAD May 17 00:35:34.867000 audit[2976]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001cb028 items=0 ppid=2826 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:34.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333534363762643461656337393864313132346463333930323863 May 17 00:35:34.867000 audit: BPF prog-id=132 op=UNLOAD May 17 00:35:34.867000 audit: BPF prog-id=131 op=UNLOAD May 17 00:35:34.867000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.867000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.867000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.867000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.867000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.867000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.867000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.867000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.867000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.867000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:34.867000 audit: BPF prog-id=133 op=LOAD May 17 00:35:34.867000 audit[2976]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001cb438 items=0 ppid=2826 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:34.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333534363762643461656337393864313132346463333930323863 May 17 00:35:35.009665 env[1435]: time="2025-05-17T00:35:35.009624784Z" level=info msg="StartContainer for \"f135467bd4aec798d1124dc39028ca99d041a03850280fc6aa3ebb69ebb8e72a\" returns successfully" May 17 00:35:35.121167 kubelet[2423]: E0517 00:35:35.121130 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.121167 kubelet[2423]: W0517 00:35:35.121159 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.121448 kubelet[2423]: E0517 00:35:35.121185 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.123509 kubelet[2423]: E0517 00:35:35.123478 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.123509 kubelet[2423]: W0517 00:35:35.123499 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.123670 kubelet[2423]: E0517 00:35:35.123516 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.123895 kubelet[2423]: E0517 00:35:35.123870 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.123895 kubelet[2423]: W0517 00:35:35.123887 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.124015 kubelet[2423]: E0517 00:35:35.123901 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.126155 kubelet[2423]: E0517 00:35:35.126130 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.126155 kubelet[2423]: W0517 00:35:35.126150 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.126296 kubelet[2423]: E0517 00:35:35.126168 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.126564 kubelet[2423]: E0517 00:35:35.126548 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.126564 kubelet[2423]: W0517 00:35:35.126562 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.126703 kubelet[2423]: E0517 00:35:35.126576 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.126797 kubelet[2423]: E0517 00:35:35.126777 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.126797 kubelet[2423]: W0517 00:35:35.126794 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.126908 kubelet[2423]: E0517 00:35:35.126807 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.127110 kubelet[2423]: E0517 00:35:35.127071 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.127110 kubelet[2423]: W0517 00:35:35.127088 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.127110 kubelet[2423]: E0517 00:35:35.127103 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.127339 kubelet[2423]: E0517 00:35:35.127308 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.127339 kubelet[2423]: W0517 00:35:35.127319 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.127339 kubelet[2423]: E0517 00:35:35.127331 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.127553 kubelet[2423]: E0517 00:35:35.127536 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.127553 kubelet[2423]: W0517 00:35:35.127553 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.127671 kubelet[2423]: E0517 00:35:35.127569 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.127758 kubelet[2423]: E0517 00:35:35.127743 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.127824 kubelet[2423]: W0517 00:35:35.127758 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.127824 kubelet[2423]: E0517 00:35:35.127770 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.127958 kubelet[2423]: E0517 00:35:35.127943 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.128026 kubelet[2423]: W0517 00:35:35.127959 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.128026 kubelet[2423]: E0517 00:35:35.127971 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.128155 kubelet[2423]: E0517 00:35:35.128146 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.128211 kubelet[2423]: W0517 00:35:35.128157 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.128211 kubelet[2423]: E0517 00:35:35.128171 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.130537 kubelet[2423]: E0517 00:35:35.130517 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.130537 kubelet[2423]: W0517 00:35:35.130535 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.130681 kubelet[2423]: E0517 00:35:35.130550 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.132474 kubelet[2423]: E0517 00:35:35.132452 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.132474 kubelet[2423]: W0517 00:35:35.132471 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.132616 kubelet[2423]: E0517 00:35:35.132486 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.132806 kubelet[2423]: E0517 00:35:35.132786 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.132806 kubelet[2423]: W0517 00:35:35.132805 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.132917 kubelet[2423]: E0517 00:35:35.132819 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.180953 kubelet[2423]: E0517 00:35:35.180909 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.180953 kubelet[2423]: W0517 00:35:35.180939 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.181213 kubelet[2423]: E0517 00:35:35.180963 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.181282 kubelet[2423]: E0517 00:35:35.181258 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.181282 kubelet[2423]: W0517 00:35:35.181270 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.181372 kubelet[2423]: E0517 00:35:35.181283 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.181586 kubelet[2423]: E0517 00:35:35.181568 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.181586 kubelet[2423]: W0517 00:35:35.181584 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.181719 kubelet[2423]: E0517 00:35:35.181598 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.183479 kubelet[2423]: E0517 00:35:35.183451 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.183479 kubelet[2423]: W0517 00:35:35.183470 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.183636 kubelet[2423]: E0517 00:35:35.183484 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.183737 kubelet[2423]: E0517 00:35:35.183721 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.183807 kubelet[2423]: W0517 00:35:35.183738 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.183807 kubelet[2423]: E0517 00:35:35.183751 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.183969 kubelet[2423]: E0517 00:35:35.183954 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.184044 kubelet[2423]: W0517 00:35:35.183970 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.184044 kubelet[2423]: E0517 00:35:35.183983 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.184208 kubelet[2423]: E0517 00:35:35.184192 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.184290 kubelet[2423]: W0517 00:35:35.184208 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.184290 kubelet[2423]: E0517 00:35:35.184221 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.184456 kubelet[2423]: E0517 00:35:35.184436 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.184456 kubelet[2423]: W0517 00:35:35.184447 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.184560 kubelet[2423]: E0517 00:35:35.184459 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.184718 kubelet[2423]: E0517 00:35:35.184706 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.184784 kubelet[2423]: W0517 00:35:35.184719 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.184784 kubelet[2423]: E0517 00:35:35.184734 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.185143 kubelet[2423]: E0517 00:35:35.185113 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.185143 kubelet[2423]: W0517 00:35:35.185130 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.185143 kubelet[2423]: E0517 00:35:35.185144 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.187473 kubelet[2423]: E0517 00:35:35.187453 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.187473 kubelet[2423]: W0517 00:35:35.187471 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.187617 kubelet[2423]: E0517 00:35:35.187485 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.187798 kubelet[2423]: E0517 00:35:35.187782 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.187798 kubelet[2423]: W0517 00:35:35.187798 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.187918 kubelet[2423]: E0517 00:35:35.187811 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.188038 kubelet[2423]: E0517 00:35:35.188021 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.188099 kubelet[2423]: W0517 00:35:35.188038 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.188099 kubelet[2423]: E0517 00:35:35.188052 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.188284 kubelet[2423]: E0517 00:35:35.188268 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.188284 kubelet[2423]: W0517 00:35:35.188284 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.188422 kubelet[2423]: E0517 00:35:35.188296 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.188590 kubelet[2423]: E0517 00:35:35.188569 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.188590 kubelet[2423]: W0517 00:35:35.188584 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.188712 kubelet[2423]: E0517 00:35:35.188597 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.189205 kubelet[2423]: E0517 00:35:35.189186 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.189205 kubelet[2423]: W0517 00:35:35.189203 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.189442 kubelet[2423]: E0517 00:35:35.189216 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.189512 kubelet[2423]: E0517 00:35:35.189463 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.189512 kubelet[2423]: W0517 00:35:35.189475 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.189512 kubelet[2423]: E0517 00:35:35.189487 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:35.189890 kubelet[2423]: E0517 00:35:35.189873 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:35.189890 kubelet[2423]: W0517 00:35:35.189890 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:35.190009 kubelet[2423]: E0517 00:35:35.189903 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.073139 kubelet[2423]: I0517 00:35:36.073102 2423 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:35:36.139187 kubelet[2423]: E0517 00:35:36.139146 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.139187 kubelet[2423]: W0517 00:35:36.139169 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.139187 kubelet[2423]: E0517 00:35:36.139195 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.139563 kubelet[2423]: E0517 00:35:36.139432 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.139563 kubelet[2423]: W0517 00:35:36.139445 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.139563 kubelet[2423]: E0517 00:35:36.139460 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.139704 kubelet[2423]: E0517 00:35:36.139664 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.139704 kubelet[2423]: W0517 00:35:36.139675 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.139704 kubelet[2423]: E0517 00:35:36.139688 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.139953 kubelet[2423]: E0517 00:35:36.139936 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.139953 kubelet[2423]: W0517 00:35:36.139950 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.140090 kubelet[2423]: E0517 00:35:36.139964 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.140242 kubelet[2423]: E0517 00:35:36.140224 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.140324 kubelet[2423]: W0517 00:35:36.140238 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.140324 kubelet[2423]: E0517 00:35:36.140261 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.140482 kubelet[2423]: E0517 00:35:36.140467 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.140482 kubelet[2423]: W0517 00:35:36.140478 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.140603 kubelet[2423]: E0517 00:35:36.140491 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.140682 kubelet[2423]: E0517 00:35:36.140666 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.140748 kubelet[2423]: W0517 00:35:36.140683 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.140748 kubelet[2423]: E0517 00:35:36.140696 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.140891 kubelet[2423]: E0517 00:35:36.140872 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.140891 kubelet[2423]: W0517 00:35:36.140888 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.141009 kubelet[2423]: E0517 00:35:36.140900 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.141104 kubelet[2423]: E0517 00:35:36.141089 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.141104 kubelet[2423]: W0517 00:35:36.141102 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.141227 kubelet[2423]: E0517 00:35:36.141115 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.141292 kubelet[2423]: E0517 00:35:36.141277 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.141341 kubelet[2423]: W0517 00:35:36.141295 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.141341 kubelet[2423]: E0517 00:35:36.141306 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.141514 kubelet[2423]: E0517 00:35:36.141498 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.141514 kubelet[2423]: W0517 00:35:36.141511 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.141635 kubelet[2423]: E0517 00:35:36.141523 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.141718 kubelet[2423]: E0517 00:35:36.141702 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.141718 kubelet[2423]: W0517 00:35:36.141715 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.141838 kubelet[2423]: E0517 00:35:36.141726 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.141915 kubelet[2423]: E0517 00:35:36.141901 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.141974 kubelet[2423]: W0517 00:35:36.141918 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.141974 kubelet[2423]: E0517 00:35:36.141929 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.142122 kubelet[2423]: E0517 00:35:36.142109 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.142193 kubelet[2423]: W0517 00:35:36.142122 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.142193 kubelet[2423]: E0517 00:35:36.142134 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.142320 kubelet[2423]: E0517 00:35:36.142305 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.142377 kubelet[2423]: W0517 00:35:36.142321 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.142377 kubelet[2423]: E0517 00:35:36.142332 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.146398 env[1435]: time="2025-05-17T00:35:36.146352141Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:36.154233 env[1435]: time="2025-05-17T00:35:36.154195172Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:36.159281 env[1435]: time="2025-05-17T00:35:36.159247886Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:36.163235 env[1435]: time="2025-05-17T00:35:36.163200253Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:36.163722 env[1435]: time="2025-05-17T00:35:36.163691673Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:35:36.170894 env[1435]: time="2025-05-17T00:35:36.170833575Z" level=info msg="CreateContainer within sandbox \"80afade07bc2573dd5190b2375cd0652016933e7ceb09926c3783dc469b37f44\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:35:36.187760 kubelet[2423]: E0517 00:35:36.187413 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.187760 kubelet[2423]: W0517 00:35:36.187438 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.187760 kubelet[2423]: E0517 00:35:36.187464 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.188034 kubelet[2423]: E0517 00:35:36.187799 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.188034 kubelet[2423]: W0517 00:35:36.187814 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.188034 kubelet[2423]: E0517 00:35:36.187830 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.188266 kubelet[2423]: E0517 00:35:36.188115 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.188266 kubelet[2423]: W0517 00:35:36.188140 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.188266 kubelet[2423]: E0517 00:35:36.188155 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.188484 kubelet[2423]: E0517 00:35:36.188464 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.188484 kubelet[2423]: W0517 00:35:36.188477 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.188606 kubelet[2423]: E0517 00:35:36.188493 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.188805 kubelet[2423]: E0517 00:35:36.188777 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.188805 kubelet[2423]: W0517 00:35:36.188804 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.188958 kubelet[2423]: E0517 00:35:36.188820 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.189174 kubelet[2423]: E0517 00:35:36.189152 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.189174 kubelet[2423]: W0517 00:35:36.189169 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.189356 kubelet[2423]: E0517 00:35:36.189185 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.189472 kubelet[2423]: E0517 00:35:36.189452 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.189552 kubelet[2423]: W0517 00:35:36.189473 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.189552 kubelet[2423]: E0517 00:35:36.189489 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.189858 kubelet[2423]: E0517 00:35:36.189705 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.189858 kubelet[2423]: W0517 00:35:36.189719 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.189858 kubelet[2423]: E0517 00:35:36.189736 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.190079 kubelet[2423]: E0517 00:35:36.189948 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.190079 kubelet[2423]: W0517 00:35:36.189960 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.190079 kubelet[2423]: E0517 00:35:36.189974 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.190271 kubelet[2423]: E0517 00:35:36.190224 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.190271 kubelet[2423]: W0517 00:35:36.190237 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.190271 kubelet[2423]: E0517 00:35:36.190250 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.190731 kubelet[2423]: E0517 00:35:36.190711 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.190731 kubelet[2423]: W0517 00:35:36.190729 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.190889 kubelet[2423]: E0517 00:35:36.190747 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.191025 kubelet[2423]: E0517 00:35:36.191007 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.191025 kubelet[2423]: W0517 00:35:36.191022 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.191184 kubelet[2423]: E0517 00:35:36.191042 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.191831 kubelet[2423]: E0517 00:35:36.191350 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.191831 kubelet[2423]: W0517 00:35:36.191412 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.191831 kubelet[2423]: E0517 00:35:36.191430 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.193972 kubelet[2423]: E0517 00:35:36.191881 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.193972 kubelet[2423]: W0517 00:35:36.191896 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.193972 kubelet[2423]: E0517 00:35:36.191909 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.193972 kubelet[2423]: E0517 00:35:36.192124 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.193972 kubelet[2423]: W0517 00:35:36.192134 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.193972 kubelet[2423]: E0517 00:35:36.192145 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.193972 kubelet[2423]: E0517 00:35:36.192488 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.193972 kubelet[2423]: W0517 00:35:36.192499 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.193972 kubelet[2423]: E0517 00:35:36.192511 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.193972 kubelet[2423]: E0517 00:35:36.193036 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.194304 kubelet[2423]: W0517 00:35:36.193059 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.194304 kubelet[2423]: E0517 00:35:36.193080 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.194304 kubelet[2423]: E0517 00:35:36.193924 2423 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:35:36.194304 kubelet[2423]: W0517 00:35:36.193938 2423 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:35:36.194304 kubelet[2423]: E0517 00:35:36.193956 2423 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:35:36.209718 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount271696209.mount: Deactivated successfully. May 17 00:35:36.229921 env[1435]: time="2025-05-17T00:35:36.229820766Z" level=info msg="CreateContainer within sandbox \"80afade07bc2573dd5190b2375cd0652016933e7ceb09926c3783dc469b37f44\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"75d0dd37cbaef178555cdd49e9878ad9206bec139d2b4a41039aa24c26c83294\"" May 17 00:35:36.232328 env[1435]: time="2025-05-17T00:35:36.230611200Z" level=info msg="StartContainer for \"75d0dd37cbaef178555cdd49e9878ad9206bec139d2b4a41039aa24c26c83294\"" May 17 00:35:36.252562 systemd[1]: Started cri-containerd-75d0dd37cbaef178555cdd49e9878ad9206bec139d2b4a41039aa24c26c83294.scope. May 17 00:35:36.273000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f5bccbf8598 items=0 ppid=2905 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:36.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735643064643337636261656631373835353563646434396539383738 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit: BPF prog-id=134 op=LOAD May 17 00:35:36.273000 audit[3082]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000386af8 items=0 ppid=2905 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:36.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735643064643337636261656631373835353563646434396539383738 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit: BPF prog-id=135 op=LOAD May 17 00:35:36.273000 audit[3082]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000386b48 items=0 ppid=2905 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:36.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735643064643337636261656631373835353563646434396539383738 May 17 00:35:36.273000 audit: BPF prog-id=135 op=UNLOAD May 17 00:35:36.273000 audit: BPF prog-id=134 op=UNLOAD May 17 00:35:36.273000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:36.273000 audit: BPF prog-id=136 op=LOAD May 17 00:35:36.273000 audit[3082]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000386bd8 items=0 ppid=2905 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:36.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735643064643337636261656631373835353563646434396539383738 May 17 00:35:36.293313 env[1435]: time="2025-05-17T00:35:36.290296120Z" level=info msg="StartContainer for \"75d0dd37cbaef178555cdd49e9878ad9206bec139d2b4a41039aa24c26c83294\" returns successfully" May 17 00:35:36.297584 systemd[1]: cri-containerd-75d0dd37cbaef178555cdd49e9878ad9206bec139d2b4a41039aa24c26c83294.scope: Deactivated successfully. May 17 00:35:36.301000 audit: BPF prog-id=136 op=UNLOAD May 17 00:35:36.717123 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-75d0dd37cbaef178555cdd49e9878ad9206bec139d2b4a41039aa24c26c83294-rootfs.mount: Deactivated successfully. May 17 00:35:36.971297 kubelet[2423]: E0517 00:35:36.971171 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wk56l" podUID="15b079d6-0080-4890-bd00-77adf92b4b29" May 17 00:35:37.092841 kubelet[2423]: I0517 00:35:37.092761 2423 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-84fcdd4fb7-2qgrr" podStartSLOduration=2.9337018969999997 podStartE2EDuration="6.092741015s" podCreationTimestamp="2025-05-17 00:35:31 +0000 UTC" firstStartedPulling="2025-05-17 00:35:31.551091382 +0000 UTC m=+17.702122957" lastFinishedPulling="2025-05-17 00:35:34.7101305 +0000 UTC m=+20.861162075" observedRunningTime="2025-05-17 00:35:35.148892913 +0000 UTC m=+21.299924488" watchObservedRunningTime="2025-05-17 00:35:37.092741015 +0000 UTC m=+23.243772590" May 17 00:35:37.909069 env[1435]: time="2025-05-17T00:35:37.908981449Z" level=info msg="shim disconnected" id=75d0dd37cbaef178555cdd49e9878ad9206bec139d2b4a41039aa24c26c83294 May 17 00:35:37.909069 env[1435]: time="2025-05-17T00:35:37.909069452Z" level=warning msg="cleaning up after shim disconnected" id=75d0dd37cbaef178555cdd49e9878ad9206bec139d2b4a41039aa24c26c83294 namespace=k8s.io May 17 00:35:37.909069 env[1435]: time="2025-05-17T00:35:37.909084453Z" level=info msg="cleaning up dead shim" May 17 00:35:37.917305 env[1435]: time="2025-05-17T00:35:37.917244289Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:35:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3127 runtime=io.containerd.runc.v2\n" May 17 00:35:38.080672 env[1435]: time="2025-05-17T00:35:38.080628242Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:35:38.971359 kubelet[2423]: E0517 00:35:38.971308 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wk56l" podUID="15b079d6-0080-4890-bd00-77adf92b4b29" May 17 00:35:40.971662 kubelet[2423]: E0517 00:35:40.971616 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wk56l" podUID="15b079d6-0080-4890-bd00-77adf92b4b29" May 17 00:35:42.585835 env[1435]: time="2025-05-17T00:35:42.585783085Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:42.594646 env[1435]: time="2025-05-17T00:35:42.594608307Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:42.597934 env[1435]: time="2025-05-17T00:35:42.597899427Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:42.603385 env[1435]: time="2025-05-17T00:35:42.603356927Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:42.603800 env[1435]: time="2025-05-17T00:35:42.603772942Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:35:42.612547 env[1435]: time="2025-05-17T00:35:42.612517461Z" level=info msg="CreateContainer within sandbox \"80afade07bc2573dd5190b2375cd0652016933e7ceb09926c3783dc469b37f44\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:35:42.650738 env[1435]: time="2025-05-17T00:35:42.650690756Z" level=info msg="CreateContainer within sandbox \"80afade07bc2573dd5190b2375cd0652016933e7ceb09926c3783dc469b37f44\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"5a58987810fad15caa251c6030225517087384ac028fe977f8c8cce8c2715693\"" May 17 00:35:42.653159 env[1435]: time="2025-05-17T00:35:42.651273277Z" level=info msg="StartContainer for \"5a58987810fad15caa251c6030225517087384ac028fe977f8c8cce8c2715693\"" May 17 00:35:42.679377 systemd[1]: run-containerd-runc-k8s.io-5a58987810fad15caa251c6030225517087384ac028fe977f8c8cce8c2715693-runc.XEAWPI.mount: Deactivated successfully. May 17 00:35:42.682922 systemd[1]: Started cri-containerd-5a58987810fad15caa251c6030225517087384ac028fe977f8c8cce8c2715693.scope. May 17 00:35:42.700000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.704670 kernel: kauditd_printk_skb: 91 callbacks suppressed May 17 00:35:42.704771 kernel: audit: type=1400 audit(1747442142.700:1012): avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.737704 kernel: audit: type=1300 audit(1747442142.700:1012): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fab345f3c38 items=0 ppid=2905 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:42.700000 audit[3146]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fab345f3c38 items=0 ppid=2905 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:42.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561353839383738313066616431356361613235316336303330323235 May 17 00:35:42.756466 kernel: audit: type=1327 audit(1747442142.700:1012): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561353839383738313066616431356361613235316336303330323235 May 17 00:35:42.705000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.769499 kernel: audit: type=1400 audit(1747442142.705:1013): avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.705000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.786460 kernel: audit: type=1400 audit(1747442142.705:1013): avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.705000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.705000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.814506 kernel: audit: type=1400 audit(1747442142.705:1013): avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.814666 kernel: audit: type=1400 audit(1747442142.705:1013): avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.705000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.827951 kernel: audit: type=1400 audit(1747442142.705:1013): avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.828663 kernel: audit: type=1400 audit(1747442142.705:1013): avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.705000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.705000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.847778 env[1435]: time="2025-05-17T00:35:42.847733255Z" level=info msg="StartContainer for \"5a58987810fad15caa251c6030225517087384ac028fe977f8c8cce8c2715693\" returns successfully" May 17 00:35:42.852367 kernel: audit: type=1400 audit(1747442142.705:1013): avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.705000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.705000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.705000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.705000 audit: BPF prog-id=137 op=LOAD May 17 00:35:42.705000 audit[3146]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000287a68 items=0 ppid=2905 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:42.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561353839383738313066616431356361613235316336303330323235 May 17 00:35:42.717000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.717000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.717000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.717000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.717000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.717000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.717000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.717000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.717000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.717000 audit: BPF prog-id=138 op=LOAD May 17 00:35:42.717000 audit[3146]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000287ab8 items=0 ppid=2905 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:42.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561353839383738313066616431356361613235316336303330323235 May 17 00:35:42.717000 audit: BPF prog-id=138 op=UNLOAD May 17 00:35:42.717000 audit: BPF prog-id=137 op=UNLOAD May 17 00:35:42.717000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.717000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.717000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.717000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.717000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.717000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.717000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.717000 audit[3146]: AVC avc: denied { perfmon } for pid=3146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.717000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.717000 audit[3146]: AVC avc: denied { bpf } for pid=3146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:42.717000 audit: BPF prog-id=139 op=LOAD May 17 00:35:42.717000 audit[3146]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000287b48 items=0 ppid=2905 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:42.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561353839383738313066616431356361613235316336303330323235 May 17 00:35:42.971534 kubelet[2423]: E0517 00:35:42.971481 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wk56l" podUID="15b079d6-0080-4890-bd00-77adf92b4b29" May 17 00:35:44.587512 env[1435]: time="2025-05-17T00:35:44.587437983Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:35:44.589884 systemd[1]: cri-containerd-5a58987810fad15caa251c6030225517087384ac028fe977f8c8cce8c2715693.scope: Deactivated successfully. May 17 00:35:44.592000 audit: BPF prog-id=139 op=UNLOAD May 17 00:35:44.610822 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5a58987810fad15caa251c6030225517087384ac028fe977f8c8cce8c2715693-rootfs.mount: Deactivated successfully. May 17 00:35:44.676420 kubelet[2423]: I0517 00:35:44.676123 2423 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 17 00:35:45.859950 env[1435]: time="2025-05-17T00:35:45.857408477Z" level=info msg="shim disconnected" id=5a58987810fad15caa251c6030225517087384ac028fe977f8c8cce8c2715693 May 17 00:35:45.859950 env[1435]: time="2025-05-17T00:35:45.857473179Z" level=warning msg="cleaning up after shim disconnected" id=5a58987810fad15caa251c6030225517087384ac028fe977f8c8cce8c2715693 namespace=k8s.io May 17 00:35:45.859950 env[1435]: time="2025-05-17T00:35:45.857487779Z" level=info msg="cleaning up dead shim" May 17 00:35:45.862401 systemd[1]: Created slice kubepods-besteffort-pod15b079d6_0080_4890_bd00_77adf92b4b29.slice. May 17 00:35:45.864693 kubelet[2423]: I0517 00:35:45.864659 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/45bfa60a-c71f-458b-8107-d8ab858817d5-whisker-backend-key-pair\") pod \"whisker-7d5bdd5447-s9cpp\" (UID: \"45bfa60a-c71f-458b-8107-d8ab858817d5\") " pod="calico-system/whisker-7d5bdd5447-s9cpp" May 17 00:35:45.874881 kubelet[2423]: I0517 00:35:45.874445 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/45bfa60a-c71f-458b-8107-d8ab858817d5-whisker-ca-bundle\") pod \"whisker-7d5bdd5447-s9cpp\" (UID: \"45bfa60a-c71f-458b-8107-d8ab858817d5\") " pod="calico-system/whisker-7d5bdd5447-s9cpp" May 17 00:35:45.874881 kubelet[2423]: I0517 00:35:45.874497 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v4tpp\" (UniqueName: \"kubernetes.io/projected/45bfa60a-c71f-458b-8107-d8ab858817d5-kube-api-access-v4tpp\") pod \"whisker-7d5bdd5447-s9cpp\" (UID: \"45bfa60a-c71f-458b-8107-d8ab858817d5\") " pod="calico-system/whisker-7d5bdd5447-s9cpp" May 17 00:35:45.875429 env[1435]: time="2025-05-17T00:35:45.875377289Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wk56l,Uid:15b079d6-0080-4890-bd00-77adf92b4b29,Namespace:calico-system,Attempt:0,}" May 17 00:35:45.877619 env[1435]: time="2025-05-17T00:35:45.877185651Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:35:45Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3186 runtime=io.containerd.runc.v2\n" May 17 00:35:45.880346 systemd[1]: Created slice kubepods-besteffort-pod45bfa60a_c71f_458b_8107_d8ab858817d5.slice. May 17 00:35:45.889362 systemd[1]: Created slice kubepods-burstable-pod238f3626_0d31_4ca4_950c_dfe985793111.slice. May 17 00:35:45.900780 systemd[1]: Created slice kubepods-besteffort-pod1c2b527d_d98b_4db0_86b0_f54b67fb605f.slice. May 17 00:35:45.931364 systemd[1]: Created slice kubepods-besteffort-pod245c2865_77c9_4af3_afa1_058bc899e239.slice. May 17 00:35:45.954751 systemd[1]: Created slice kubepods-besteffort-pod68bd3f92_8819_482c_a4dc_243b1c1b6b66.slice. May 17 00:35:45.961528 systemd[1]: Created slice kubepods-besteffort-pod90fc490d_b68e_41e0_a777_9015e6ba2a3c.slice. May 17 00:35:45.975169 kubelet[2423]: I0517 00:35:45.975115 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s5vnq\" (UniqueName: \"kubernetes.io/projected/238f3626-0d31-4ca4-950c-dfe985793111-kube-api-access-s5vnq\") pod \"coredns-674b8bbfcf-ggpwh\" (UID: \"238f3626-0d31-4ca4-950c-dfe985793111\") " pod="kube-system/coredns-674b8bbfcf-ggpwh" May 17 00:35:45.975470 kubelet[2423]: I0517 00:35:45.975447 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/633d4cfc-246e-48fa-a39a-e5371f8453be-config-volume\") pod \"coredns-674b8bbfcf-6swpt\" (UID: \"633d4cfc-246e-48fa-a39a-e5371f8453be\") " pod="kube-system/coredns-674b8bbfcf-6swpt" May 17 00:35:45.975612 systemd[1]: Created slice kubepods-burstable-pod633d4cfc_246e_48fa_a39a_e5371f8453be.slice. May 17 00:35:45.975852 kubelet[2423]: I0517 00:35:45.975618 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1c2b527d-d98b-4db0-86b0-f54b67fb605f-tigera-ca-bundle\") pod \"calico-kube-controllers-5f47758c9f-l26k9\" (UID: \"1c2b527d-d98b-4db0-86b0-f54b67fb605f\") " pod="calico-system/calico-kube-controllers-5f47758c9f-l26k9" May 17 00:35:45.975979 kubelet[2423]: I0517 00:35:45.975963 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s9h7z\" (UniqueName: \"kubernetes.io/projected/1c2b527d-d98b-4db0-86b0-f54b67fb605f-kube-api-access-s9h7z\") pod \"calico-kube-controllers-5f47758c9f-l26k9\" (UID: \"1c2b527d-d98b-4db0-86b0-f54b67fb605f\") " pod="calico-system/calico-kube-controllers-5f47758c9f-l26k9" May 17 00:35:45.976148 kubelet[2423]: I0517 00:35:45.976132 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/68bd3f92-8819-482c-a4dc-243b1c1b6b66-calico-apiserver-certs\") pod \"calico-apiserver-7664dbdf7c-5c5jt\" (UID: \"68bd3f92-8819-482c-a4dc-243b1c1b6b66\") " pod="calico-apiserver/calico-apiserver-7664dbdf7c-5c5jt" May 17 00:35:45.976310 kubelet[2423]: I0517 00:35:45.976294 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/238f3626-0d31-4ca4-950c-dfe985793111-config-volume\") pod \"coredns-674b8bbfcf-ggpwh\" (UID: \"238f3626-0d31-4ca4-950c-dfe985793111\") " pod="kube-system/coredns-674b8bbfcf-ggpwh" May 17 00:35:45.977692 kubelet[2423]: I0517 00:35:45.977668 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h8mcs\" (UniqueName: \"kubernetes.io/projected/633d4cfc-246e-48fa-a39a-e5371f8453be-kube-api-access-h8mcs\") pod \"coredns-674b8bbfcf-6swpt\" (UID: \"633d4cfc-246e-48fa-a39a-e5371f8453be\") " pod="kube-system/coredns-674b8bbfcf-6swpt" May 17 00:35:45.978239 kubelet[2423]: I0517 00:35:45.978211 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7mklh\" (UniqueName: \"kubernetes.io/projected/245c2865-77c9-4af3-afa1-058bc899e239-kube-api-access-7mklh\") pod \"calico-apiserver-7664dbdf7c-5265z\" (UID: \"245c2865-77c9-4af3-afa1-058bc899e239\") " pod="calico-apiserver/calico-apiserver-7664dbdf7c-5265z" May 17 00:35:45.979063 kubelet[2423]: I0517 00:35:45.979028 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/245c2865-77c9-4af3-afa1-058bc899e239-calico-apiserver-certs\") pod \"calico-apiserver-7664dbdf7c-5265z\" (UID: \"245c2865-77c9-4af3-afa1-058bc899e239\") " pod="calico-apiserver/calico-apiserver-7664dbdf7c-5265z" May 17 00:35:45.999470 kubelet[2423]: I0517 00:35:45.999435 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-znswt\" (UniqueName: \"kubernetes.io/projected/68bd3f92-8819-482c-a4dc-243b1c1b6b66-kube-api-access-znswt\") pod \"calico-apiserver-7664dbdf7c-5c5jt\" (UID: \"68bd3f92-8819-482c-a4dc-243b1c1b6b66\") " pod="calico-apiserver/calico-apiserver-7664dbdf7c-5c5jt" May 17 00:35:46.057522 env[1435]: time="2025-05-17T00:35:46.057443548Z" level=error msg="Failed to destroy network for sandbox \"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.060458 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b-shm.mount: Deactivated successfully. May 17 00:35:46.061760 env[1435]: time="2025-05-17T00:35:46.061703890Z" level=error msg="encountered an error cleaning up failed sandbox \"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.061895 env[1435]: time="2025-05-17T00:35:46.061786193Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wk56l,Uid:15b079d6-0080-4890-bd00-77adf92b4b29,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.062124 kubelet[2423]: E0517 00:35:46.062077 2423 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.062222 kubelet[2423]: E0517 00:35:46.062189 2423 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wk56l" May 17 00:35:46.062281 kubelet[2423]: E0517 00:35:46.062236 2423 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wk56l" May 17 00:35:46.062360 kubelet[2423]: E0517 00:35:46.062324 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-wk56l_calico-system(15b079d6-0080-4890-bd00-77adf92b4b29)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-wk56l_calico-system(15b079d6-0080-4890-bd00-77adf92b4b29)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wk56l" podUID="15b079d6-0080-4890-bd00-77adf92b4b29" May 17 00:35:46.100600 kubelet[2423]: I0517 00:35:46.099759 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/90fc490d-b68e-41e0-a777-9015e6ba2a3c-config\") pod \"goldmane-78d55f7ddc-ktd8c\" (UID: \"90fc490d-b68e-41e0-a777-9015e6ba2a3c\") " pod="calico-system/goldmane-78d55f7ddc-ktd8c" May 17 00:35:46.100600 kubelet[2423]: I0517 00:35:46.099828 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/90fc490d-b68e-41e0-a777-9015e6ba2a3c-goldmane-ca-bundle\") pod \"goldmane-78d55f7ddc-ktd8c\" (UID: \"90fc490d-b68e-41e0-a777-9015e6ba2a3c\") " pod="calico-system/goldmane-78d55f7ddc-ktd8c" May 17 00:35:46.103104 kubelet[2423]: I0517 00:35:46.102941 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/90fc490d-b68e-41e0-a777-9015e6ba2a3c-goldmane-key-pair\") pod \"goldmane-78d55f7ddc-ktd8c\" (UID: \"90fc490d-b68e-41e0-a777-9015e6ba2a3c\") " pod="calico-system/goldmane-78d55f7ddc-ktd8c" May 17 00:35:46.103104 kubelet[2423]: I0517 00:35:46.103071 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nl5jn\" (UniqueName: \"kubernetes.io/projected/90fc490d-b68e-41e0-a777-9015e6ba2a3c-kube-api-access-nl5jn\") pod \"goldmane-78d55f7ddc-ktd8c\" (UID: \"90fc490d-b68e-41e0-a777-9015e6ba2a3c\") " pod="calico-system/goldmane-78d55f7ddc-ktd8c" May 17 00:35:46.124120 env[1435]: time="2025-05-17T00:35:46.122356209Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:35:46.124120 env[1435]: time="2025-05-17T00:35:46.123856759Z" level=info msg="StopPodSandbox for \"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\"" May 17 00:35:46.124299 kubelet[2423]: I0517 00:35:46.123178 2423 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" May 17 00:35:46.174231 env[1435]: time="2025-05-17T00:35:46.174160234Z" level=error msg="StopPodSandbox for \"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\" failed" error="failed to destroy network for sandbox \"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.174480 kubelet[2423]: E0517 00:35:46.174425 2423 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" May 17 00:35:46.174588 kubelet[2423]: E0517 00:35:46.174509 2423 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b"} May 17 00:35:46.174639 kubelet[2423]: E0517 00:35:46.174594 2423 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"15b079d6-0080-4890-bd00-77adf92b4b29\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:46.174732 kubelet[2423]: E0517 00:35:46.174632 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"15b079d6-0080-4890-bd00-77adf92b4b29\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wk56l" podUID="15b079d6-0080-4890-bd00-77adf92b4b29" May 17 00:35:46.186569 env[1435]: time="2025-05-17T00:35:46.186526246Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7d5bdd5447-s9cpp,Uid:45bfa60a-c71f-458b-8107-d8ab858817d5,Namespace:calico-system,Attempt:0,}" May 17 00:35:46.199326 env[1435]: time="2025-05-17T00:35:46.199282171Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-ggpwh,Uid:238f3626-0d31-4ca4-950c-dfe985793111,Namespace:kube-system,Attempt:0,}" May 17 00:35:46.225592 env[1435]: time="2025-05-17T00:35:46.225546445Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5f47758c9f-l26k9,Uid:1c2b527d-d98b-4db0-86b0-f54b67fb605f,Namespace:calico-system,Attempt:0,}" May 17 00:35:46.241772 env[1435]: time="2025-05-17T00:35:46.241722084Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7664dbdf7c-5265z,Uid:245c2865-77c9-4af3-afa1-058bc899e239,Namespace:calico-apiserver,Attempt:0,}" May 17 00:35:46.262763 env[1435]: time="2025-05-17T00:35:46.262716583Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7664dbdf7c-5c5jt,Uid:68bd3f92-8819-482c-a4dc-243b1c1b6b66,Namespace:calico-apiserver,Attempt:0,}" May 17 00:35:46.271229 env[1435]: time="2025-05-17T00:35:46.271178064Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-ktd8c,Uid:90fc490d-b68e-41e0-a777-9015e6ba2a3c,Namespace:calico-system,Attempt:0,}" May 17 00:35:46.295203 env[1435]: time="2025-05-17T00:35:46.295143662Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-6swpt,Uid:633d4cfc-246e-48fa-a39a-e5371f8453be,Namespace:kube-system,Attempt:0,}" May 17 00:35:46.328723 env[1435]: time="2025-05-17T00:35:46.328663678Z" level=error msg="Failed to destroy network for sandbox \"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.329036 env[1435]: time="2025-05-17T00:35:46.328997089Z" level=error msg="encountered an error cleaning up failed sandbox \"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.329135 env[1435]: time="2025-05-17T00:35:46.329061592Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7d5bdd5447-s9cpp,Uid:45bfa60a-c71f-458b-8107-d8ab858817d5,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.329331 kubelet[2423]: E0517 00:35:46.329294 2423 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.329427 kubelet[2423]: E0517 00:35:46.329359 2423 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-7d5bdd5447-s9cpp" May 17 00:35:46.329427 kubelet[2423]: E0517 00:35:46.329403 2423 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-7d5bdd5447-s9cpp" May 17 00:35:46.329529 kubelet[2423]: E0517 00:35:46.329467 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-7d5bdd5447-s9cpp_calico-system(45bfa60a-c71f-458b-8107-d8ab858817d5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-7d5bdd5447-s9cpp_calico-system(45bfa60a-c71f-458b-8107-d8ab858817d5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-7d5bdd5447-s9cpp" podUID="45bfa60a-c71f-458b-8107-d8ab858817d5" May 17 00:35:46.505442 env[1435]: time="2025-05-17T00:35:46.505365262Z" level=error msg="Failed to destroy network for sandbox \"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.505786 env[1435]: time="2025-05-17T00:35:46.505739774Z" level=error msg="encountered an error cleaning up failed sandbox \"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.505888 env[1435]: time="2025-05-17T00:35:46.505807176Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-ggpwh,Uid:238f3626-0d31-4ca4-950c-dfe985793111,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.506080 kubelet[2423]: E0517 00:35:46.506043 2423 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.506181 kubelet[2423]: E0517 00:35:46.506114 2423 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-ggpwh" May 17 00:35:46.506181 kubelet[2423]: E0517 00:35:46.506149 2423 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-ggpwh" May 17 00:35:46.506273 kubelet[2423]: E0517 00:35:46.506209 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-ggpwh_kube-system(238f3626-0d31-4ca4-950c-dfe985793111)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-ggpwh_kube-system(238f3626-0d31-4ca4-950c-dfe985793111)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-ggpwh" podUID="238f3626-0d31-4ca4-950c-dfe985793111" May 17 00:35:46.573237 env[1435]: time="2025-05-17T00:35:46.573162019Z" level=error msg="Failed to destroy network for sandbox \"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.573874 env[1435]: time="2025-05-17T00:35:46.573822141Z" level=error msg="encountered an error cleaning up failed sandbox \"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.574077 env[1435]: time="2025-05-17T00:35:46.574041648Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7664dbdf7c-5265z,Uid:245c2865-77c9-4af3-afa1-058bc899e239,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.574753 kubelet[2423]: E0517 00:35:46.574701 2423 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.574867 kubelet[2423]: E0517 00:35:46.574780 2423 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7664dbdf7c-5265z" May 17 00:35:46.574867 kubelet[2423]: E0517 00:35:46.574814 2423 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7664dbdf7c-5265z" May 17 00:35:46.574968 kubelet[2423]: E0517 00:35:46.574883 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7664dbdf7c-5265z_calico-apiserver(245c2865-77c9-4af3-afa1-058bc899e239)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7664dbdf7c-5265z_calico-apiserver(245c2865-77c9-4af3-afa1-058bc899e239)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7664dbdf7c-5265z" podUID="245c2865-77c9-4af3-afa1-058bc899e239" May 17 00:35:46.587816 env[1435]: time="2025-05-17T00:35:46.587751805Z" level=error msg="Failed to destroy network for sandbox \"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.588104 env[1435]: time="2025-05-17T00:35:46.588068815Z" level=error msg="encountered an error cleaning up failed sandbox \"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.588246 env[1435]: time="2025-05-17T00:35:46.588205020Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5f47758c9f-l26k9,Uid:1c2b527d-d98b-4db0-86b0-f54b67fb605f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.589724 kubelet[2423]: E0517 00:35:46.588518 2423 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.589724 kubelet[2423]: E0517 00:35:46.588587 2423 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5f47758c9f-l26k9" May 17 00:35:46.589724 kubelet[2423]: E0517 00:35:46.588614 2423 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5f47758c9f-l26k9" May 17 00:35:46.589942 kubelet[2423]: E0517 00:35:46.588680 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5f47758c9f-l26k9_calico-system(1c2b527d-d98b-4db0-86b0-f54b67fb605f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5f47758c9f-l26k9_calico-system(1c2b527d-d98b-4db0-86b0-f54b67fb605f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5f47758c9f-l26k9" podUID="1c2b527d-d98b-4db0-86b0-f54b67fb605f" May 17 00:35:46.637685 env[1435]: time="2025-05-17T00:35:46.637614265Z" level=error msg="Failed to destroy network for sandbox \"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.638083 env[1435]: time="2025-05-17T00:35:46.638029479Z" level=error msg="encountered an error cleaning up failed sandbox \"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.638191 env[1435]: time="2025-05-17T00:35:46.638107881Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7664dbdf7c-5c5jt,Uid:68bd3f92-8819-482c-a4dc-243b1c1b6b66,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.638458 kubelet[2423]: E0517 00:35:46.638407 2423 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.638575 kubelet[2423]: E0517 00:35:46.638505 2423 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7664dbdf7c-5c5jt" May 17 00:35:46.638575 kubelet[2423]: E0517 00:35:46.638541 2423 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7664dbdf7c-5c5jt" May 17 00:35:46.638675 kubelet[2423]: E0517 00:35:46.638628 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7664dbdf7c-5c5jt_calico-apiserver(68bd3f92-8819-482c-a4dc-243b1c1b6b66)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7664dbdf7c-5c5jt_calico-apiserver(68bd3f92-8819-482c-a4dc-243b1c1b6b66)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7664dbdf7c-5c5jt" podUID="68bd3f92-8819-482c-a4dc-243b1c1b6b66" May 17 00:35:46.675964 env[1435]: time="2025-05-17T00:35:46.675898240Z" level=error msg="Failed to destroy network for sandbox \"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.676585 env[1435]: time="2025-05-17T00:35:46.676537661Z" level=error msg="encountered an error cleaning up failed sandbox \"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.676822 env[1435]: time="2025-05-17T00:35:46.676772469Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-6swpt,Uid:633d4cfc-246e-48fa-a39a-e5371f8453be,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.677949 kubelet[2423]: E0517 00:35:46.677192 2423 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.677949 kubelet[2423]: E0517 00:35:46.677270 2423 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-6swpt" May 17 00:35:46.677949 kubelet[2423]: E0517 00:35:46.677311 2423 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-6swpt" May 17 00:35:46.678196 kubelet[2423]: E0517 00:35:46.677399 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-6swpt_kube-system(633d4cfc-246e-48fa-a39a-e5371f8453be)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-6swpt_kube-system(633d4cfc-246e-48fa-a39a-e5371f8453be)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-6swpt" podUID="633d4cfc-246e-48fa-a39a-e5371f8453be" May 17 00:35:46.680575 env[1435]: time="2025-05-17T00:35:46.680535894Z" level=error msg="Failed to destroy network for sandbox \"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.680849 env[1435]: time="2025-05-17T00:35:46.680811803Z" level=error msg="encountered an error cleaning up failed sandbox \"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.680925 env[1435]: time="2025-05-17T00:35:46.680862805Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-ktd8c,Uid:90fc490d-b68e-41e0-a777-9015e6ba2a3c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.681115 kubelet[2423]: E0517 00:35:46.681085 2423 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:46.681201 kubelet[2423]: E0517 00:35:46.681140 2423 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-ktd8c" May 17 00:35:46.681201 kubelet[2423]: E0517 00:35:46.681171 2423 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-ktd8c" May 17 00:35:46.681292 kubelet[2423]: E0517 00:35:46.681243 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-78d55f7ddc-ktd8c_calico-system(90fc490d-b68e-41e0-a777-9015e6ba2a3c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-78d55f7ddc-ktd8c_calico-system(90fc490d-b68e-41e0-a777-9015e6ba2a3c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-ktd8c" podUID="90fc490d-b68e-41e0-a777-9015e6ba2a3c" May 17 00:35:47.125653 kubelet[2423]: I0517 00:35:47.125618 2423 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" May 17 00:35:47.126524 env[1435]: time="2025-05-17T00:35:47.126485050Z" level=info msg="StopPodSandbox for \"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\"" May 17 00:35:47.129245 kubelet[2423]: I0517 00:35:47.129218 2423 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" May 17 00:35:47.129832 env[1435]: time="2025-05-17T00:35:47.129790558Z" level=info msg="StopPodSandbox for \"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\"" May 17 00:35:47.131149 kubelet[2423]: I0517 00:35:47.131126 2423 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" May 17 00:35:47.131698 env[1435]: time="2025-05-17T00:35:47.131669819Z" level=info msg="StopPodSandbox for \"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\"" May 17 00:35:47.134403 kubelet[2423]: I0517 00:35:47.134369 2423 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" May 17 00:35:47.135039 env[1435]: time="2025-05-17T00:35:47.135003027Z" level=info msg="StopPodSandbox for \"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\"" May 17 00:35:47.138980 kubelet[2423]: I0517 00:35:47.138955 2423 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" May 17 00:35:47.142350 env[1435]: time="2025-05-17T00:35:47.142310965Z" level=info msg="StopPodSandbox for \"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\"" May 17 00:35:47.143963 kubelet[2423]: I0517 00:35:47.143931 2423 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" May 17 00:35:47.144527 env[1435]: time="2025-05-17T00:35:47.144496436Z" level=info msg="StopPodSandbox for \"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\"" May 17 00:35:47.148356 kubelet[2423]: I0517 00:35:47.148333 2423 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" May 17 00:35:47.148867 env[1435]: time="2025-05-17T00:35:47.148829977Z" level=info msg="StopPodSandbox for \"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\"" May 17 00:35:47.206595 env[1435]: time="2025-05-17T00:35:47.206522555Z" level=error msg="StopPodSandbox for \"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\" failed" error="failed to destroy network for sandbox \"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:47.207142 kubelet[2423]: E0517 00:35:47.207075 2423 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" May 17 00:35:47.207269 kubelet[2423]: E0517 00:35:47.207158 2423 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e"} May 17 00:35:47.207269 kubelet[2423]: E0517 00:35:47.207214 2423 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"245c2865-77c9-4af3-afa1-058bc899e239\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:47.207446 kubelet[2423]: E0517 00:35:47.207268 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"245c2865-77c9-4af3-afa1-058bc899e239\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7664dbdf7c-5265z" podUID="245c2865-77c9-4af3-afa1-058bc899e239" May 17 00:35:47.264696 env[1435]: time="2025-05-17T00:35:47.264625546Z" level=error msg="StopPodSandbox for \"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\" failed" error="failed to destroy network for sandbox \"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:47.264997 kubelet[2423]: E0517 00:35:47.264937 2423 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" May 17 00:35:47.265129 kubelet[2423]: E0517 00:35:47.265017 2423 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769"} May 17 00:35:47.265129 kubelet[2423]: E0517 00:35:47.265075 2423 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"633d4cfc-246e-48fa-a39a-e5371f8453be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:47.265290 kubelet[2423]: E0517 00:35:47.265122 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"633d4cfc-246e-48fa-a39a-e5371f8453be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-6swpt" podUID="633d4cfc-246e-48fa-a39a-e5371f8453be" May 17 00:35:47.266209 env[1435]: time="2025-05-17T00:35:47.266162596Z" level=error msg="StopPodSandbox for \"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\" failed" error="failed to destroy network for sandbox \"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:47.266564 kubelet[2423]: E0517 00:35:47.266524 2423 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" May 17 00:35:47.266660 kubelet[2423]: E0517 00:35:47.266587 2423 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a"} May 17 00:35:47.266660 kubelet[2423]: E0517 00:35:47.266622 2423 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"45bfa60a-c71f-458b-8107-d8ab858817d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:47.266794 kubelet[2423]: E0517 00:35:47.266663 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"45bfa60a-c71f-458b-8107-d8ab858817d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-7d5bdd5447-s9cpp" podUID="45bfa60a-c71f-458b-8107-d8ab858817d5" May 17 00:35:47.267674 env[1435]: time="2025-05-17T00:35:47.267627244Z" level=error msg="StopPodSandbox for \"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\" failed" error="failed to destroy network for sandbox \"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:47.267847 kubelet[2423]: E0517 00:35:47.267802 2423 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" May 17 00:35:47.267924 kubelet[2423]: E0517 00:35:47.267856 2423 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83"} May 17 00:35:47.267924 kubelet[2423]: E0517 00:35:47.267886 2423 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1c2b527d-d98b-4db0-86b0-f54b67fb605f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:47.268040 kubelet[2423]: E0517 00:35:47.267928 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1c2b527d-d98b-4db0-86b0-f54b67fb605f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5f47758c9f-l26k9" podUID="1c2b527d-d98b-4db0-86b0-f54b67fb605f" May 17 00:35:47.292322 env[1435]: time="2025-05-17T00:35:47.292258345Z" level=error msg="StopPodSandbox for \"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\" failed" error="failed to destroy network for sandbox \"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:47.292921 kubelet[2423]: E0517 00:35:47.292671 2423 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" May 17 00:35:47.292921 kubelet[2423]: E0517 00:35:47.292743 2423 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d"} May 17 00:35:47.292921 kubelet[2423]: E0517 00:35:47.292798 2423 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"90fc490d-b68e-41e0-a777-9015e6ba2a3c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:47.292921 kubelet[2423]: E0517 00:35:47.292828 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"90fc490d-b68e-41e0-a777-9015e6ba2a3c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-ktd8c" podUID="90fc490d-b68e-41e0-a777-9015e6ba2a3c" May 17 00:35:47.299774 env[1435]: time="2025-05-17T00:35:47.299711288Z" level=error msg="StopPodSandbox for \"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\" failed" error="failed to destroy network for sandbox \"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:47.300282 kubelet[2423]: E0517 00:35:47.300072 2423 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" May 17 00:35:47.300282 kubelet[2423]: E0517 00:35:47.300145 2423 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea"} May 17 00:35:47.300282 kubelet[2423]: E0517 00:35:47.300196 2423 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"68bd3f92-8819-482c-a4dc-243b1c1b6b66\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:47.300282 kubelet[2423]: E0517 00:35:47.300225 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"68bd3f92-8819-482c-a4dc-243b1c1b6b66\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7664dbdf7c-5c5jt" podUID="68bd3f92-8819-482c-a4dc-243b1c1b6b66" May 17 00:35:47.301706 env[1435]: time="2025-05-17T00:35:47.301662652Z" level=error msg="StopPodSandbox for \"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\" failed" error="failed to destroy network for sandbox \"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:35:47.301905 kubelet[2423]: E0517 00:35:47.301873 2423 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" May 17 00:35:47.301997 kubelet[2423]: E0517 00:35:47.301913 2423 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0"} May 17 00:35:47.302076 kubelet[2423]: E0517 00:35:47.302023 2423 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"238f3626-0d31-4ca4-950c-dfe985793111\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:35:47.302154 kubelet[2423]: E0517 00:35:47.302056 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"238f3626-0d31-4ca4-950c-dfe985793111\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-ggpwh" podUID="238f3626-0d31-4ca4-950c-dfe985793111" May 17 00:35:55.090238 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1836987304.mount: Deactivated successfully. May 17 00:35:55.138635 env[1435]: time="2025-05-17T00:35:55.138576857Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:55.149938 env[1435]: time="2025-05-17T00:35:55.149896666Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:55.155947 env[1435]: time="2025-05-17T00:35:55.155915831Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:55.160741 env[1435]: time="2025-05-17T00:35:55.160707762Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:35:55.161102 env[1435]: time="2025-05-17T00:35:55.161071672Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:35:55.185174 env[1435]: time="2025-05-17T00:35:55.185141830Z" level=info msg="CreateContainer within sandbox \"80afade07bc2573dd5190b2375cd0652016933e7ceb09926c3783dc469b37f44\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:35:55.233905 env[1435]: time="2025-05-17T00:35:55.233805461Z" level=info msg="CreateContainer within sandbox \"80afade07bc2573dd5190b2375cd0652016933e7ceb09926c3783dc469b37f44\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"2bbbf50bb8c3bd88e77ea36cc9196c673ace3e9922b22d9b12e7c2e3c0f9e4a7\"" May 17 00:35:55.234684 env[1435]: time="2025-05-17T00:35:55.234635784Z" level=info msg="StartContainer for \"2bbbf50bb8c3bd88e77ea36cc9196c673ace3e9922b22d9b12e7c2e3c0f9e4a7\"" May 17 00:35:55.262877 systemd[1]: Started cri-containerd-2bbbf50bb8c3bd88e77ea36cc9196c673ace3e9922b22d9b12e7c2e3c0f9e4a7.scope. May 17 00:35:55.292431 kernel: kauditd_printk_skb: 34 callbacks suppressed May 17 00:35:55.292553 kernel: audit: type=1400 audit(1747442155.281:1019): avc: denied { perfmon } for pid=3568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { perfmon } for pid=3568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f336e1f92f8 items=0 ppid=2905 pid=3568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:55.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262626266353062623863336264383865373765613336636339313936 May 17 00:35:55.327164 env[1435]: time="2025-05-17T00:35:55.321613363Z" level=info msg="StartContainer for \"2bbbf50bb8c3bd88e77ea36cc9196c673ace3e9922b22d9b12e7c2e3c0f9e4a7\" returns successfully" May 17 00:35:55.339993 kernel: audit: type=1300 audit(1747442155.281:1019): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f336e1f92f8 items=0 ppid=2905 pid=3568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:55.340144 kernel: audit: type=1327 audit(1747442155.281:1019): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262626266353062623863336264383865373765613336636339313936 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { bpf } for pid=3568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.355716 kernel: audit: type=1400 audit(1747442155.281:1020): avc: denied { bpf } for pid=3568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { bpf } for pid=3568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { bpf } for pid=3568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.380859 kernel: audit: type=1400 audit(1747442155.281:1020): avc: denied { bpf } for pid=3568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.380941 kernel: audit: type=1400 audit(1747442155.281:1020): avc: denied { bpf } for pid=3568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { perfmon } for pid=3568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.392491 kernel: audit: type=1400 audit(1747442155.281:1020): avc: denied { perfmon } for pid=3568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { perfmon } for pid=3568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.403816 kernel: audit: type=1400 audit(1747442155.281:1020): avc: denied { perfmon } for pid=3568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.404512 kernel: audit: type=1400 audit(1747442155.281:1020): avc: denied { perfmon } for pid=3568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { perfmon } for pid=3568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { perfmon } for pid=3568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.427594 kernel: audit: type=1400 audit(1747442155.281:1020): avc: denied { perfmon } for pid=3568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { perfmon } for pid=3568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { bpf } for pid=3568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { bpf } for pid=3568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit: BPF prog-id=140 op=LOAD May 17 00:35:55.281000 audit[3568]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024248 items=0 ppid=2905 pid=3568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:55.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262626266353062623863336264383865373765613336636339313936 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { bpf } for pid=3568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { bpf } for pid=3568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { perfmon } for pid=3568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { perfmon } for pid=3568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { perfmon } for pid=3568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { perfmon } for pid=3568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { perfmon } for pid=3568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { bpf } for pid=3568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { bpf } for pid=3568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit: BPF prog-id=141 op=LOAD May 17 00:35:55.281000 audit[3568]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024298 items=0 ppid=2905 pid=3568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:55.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262626266353062623863336264383865373765613336636339313936 May 17 00:35:55.281000 audit: BPF prog-id=141 op=UNLOAD May 17 00:35:55.281000 audit: BPF prog-id=140 op=UNLOAD May 17 00:35:55.281000 audit[3568]: AVC avc: denied { bpf } for pid=3568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { bpf } for pid=3568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { bpf } for pid=3568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { perfmon } for pid=3568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { perfmon } for pid=3568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { perfmon } for pid=3568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { perfmon } for pid=3568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { perfmon } for pid=3568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { bpf } for pid=3568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit[3568]: AVC avc: denied { bpf } for pid=3568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:55.281000 audit: BPF prog-id=142 op=LOAD May 17 00:35:55.281000 audit[3568]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024328 items=0 ppid=2905 pid=3568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:55.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262626266353062623863336264383865373765613336636339313936 May 17 00:35:55.819746 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:35:55.819943 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:35:55.920332 env[1435]: time="2025-05-17T00:35:55.920269736Z" level=info msg="StopPodSandbox for \"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\"" May 17 00:35:56.061791 env[1435]: 2025-05-17 00:35:56.006 [INFO][3619] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" May 17 00:35:56.061791 env[1435]: 2025-05-17 00:35:56.007 [INFO][3619] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" iface="eth0" netns="/var/run/netns/cni-0feccb38-fc63-ec18-db6b-189da05cf089" May 17 00:35:56.061791 env[1435]: 2025-05-17 00:35:56.007 [INFO][3619] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" iface="eth0" netns="/var/run/netns/cni-0feccb38-fc63-ec18-db6b-189da05cf089" May 17 00:35:56.061791 env[1435]: 2025-05-17 00:35:56.007 [INFO][3619] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" iface="eth0" netns="/var/run/netns/cni-0feccb38-fc63-ec18-db6b-189da05cf089" May 17 00:35:56.061791 env[1435]: 2025-05-17 00:35:56.007 [INFO][3619] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" May 17 00:35:56.061791 env[1435]: 2025-05-17 00:35:56.007 [INFO][3619] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" May 17 00:35:56.061791 env[1435]: 2025-05-17 00:35:56.045 [INFO][3630] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" HandleID="k8s-pod-network.e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" Workload="ci--3510.3.7--n--6a88388a60-k8s-whisker--7d5bdd5447--s9cpp-eth0" May 17 00:35:56.061791 env[1435]: 2025-05-17 00:35:56.045 [INFO][3630] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:56.061791 env[1435]: 2025-05-17 00:35:56.045 [INFO][3630] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:56.061791 env[1435]: 2025-05-17 00:35:56.056 [WARNING][3630] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" HandleID="k8s-pod-network.e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" Workload="ci--3510.3.7--n--6a88388a60-k8s-whisker--7d5bdd5447--s9cpp-eth0" May 17 00:35:56.061791 env[1435]: 2025-05-17 00:35:56.056 [INFO][3630] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" HandleID="k8s-pod-network.e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" Workload="ci--3510.3.7--n--6a88388a60-k8s-whisker--7d5bdd5447--s9cpp-eth0" May 17 00:35:56.061791 env[1435]: 2025-05-17 00:35:56.057 [INFO][3630] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:56.061791 env[1435]: 2025-05-17 00:35:56.060 [INFO][3619] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" May 17 00:35:56.062688 env[1435]: time="2025-05-17T00:35:56.062635796Z" level=info msg="TearDown network for sandbox \"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\" successfully" May 17 00:35:56.062831 env[1435]: time="2025-05-17T00:35:56.062804500Z" level=info msg="StopPodSandbox for \"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\" returns successfully" May 17 00:35:56.079576 kubelet[2423]: I0517 00:35:56.078580 2423 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-v4tpp\" (UniqueName: \"kubernetes.io/projected/45bfa60a-c71f-458b-8107-d8ab858817d5-kube-api-access-v4tpp\") pod \"45bfa60a-c71f-458b-8107-d8ab858817d5\" (UID: \"45bfa60a-c71f-458b-8107-d8ab858817d5\") " May 17 00:35:56.080613 kubelet[2423]: I0517 00:35:56.080579 2423 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/45bfa60a-c71f-458b-8107-d8ab858817d5-whisker-backend-key-pair\") pod \"45bfa60a-c71f-458b-8107-d8ab858817d5\" (UID: \"45bfa60a-c71f-458b-8107-d8ab858817d5\") " May 17 00:35:56.081176 kubelet[2423]: I0517 00:35:56.081148 2423 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/45bfa60a-c71f-458b-8107-d8ab858817d5-whisker-ca-bundle\") pod \"45bfa60a-c71f-458b-8107-d8ab858817d5\" (UID: \"45bfa60a-c71f-458b-8107-d8ab858817d5\") " May 17 00:35:56.082048 kubelet[2423]: I0517 00:35:56.082019 2423 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/45bfa60a-c71f-458b-8107-d8ab858817d5-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "45bfa60a-c71f-458b-8107-d8ab858817d5" (UID: "45bfa60a-c71f-458b-8107-d8ab858817d5"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 17 00:35:56.082299 kubelet[2423]: I0517 00:35:56.082279 2423 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/45bfa60a-c71f-458b-8107-d8ab858817d5-whisker-ca-bundle\") on node \"ci-3510.3.7-n-6a88388a60\" DevicePath \"\"" May 17 00:35:56.097442 kubelet[2423]: I0517 00:35:56.089757 2423 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/45bfa60a-c71f-458b-8107-d8ab858817d5-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "45bfa60a-c71f-458b-8107-d8ab858817d5" (UID: "45bfa60a-c71f-458b-8107-d8ab858817d5"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 17 00:35:56.091353 systemd[1]: run-netns-cni\x2d0feccb38\x2dfc63\x2dec18\x2ddb6b\x2d189da05cf089.mount: Deactivated successfully. May 17 00:35:56.091603 systemd[1]: var-lib-kubelet-pods-45bfa60a\x2dc71f\x2d458b\x2d8107\x2dd8ab858817d5-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. May 17 00:35:56.105197 systemd[1]: var-lib-kubelet-pods-45bfa60a\x2dc71f\x2d458b\x2d8107\x2dd8ab858817d5-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dv4tpp.mount: Deactivated successfully. May 17 00:35:56.105794 kubelet[2423]: I0517 00:35:56.105761 2423 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/45bfa60a-c71f-458b-8107-d8ab858817d5-kube-api-access-v4tpp" (OuterVolumeSpecName: "kube-api-access-v4tpp") pod "45bfa60a-c71f-458b-8107-d8ab858817d5" (UID: "45bfa60a-c71f-458b-8107-d8ab858817d5"). InnerVolumeSpecName "kube-api-access-v4tpp". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 17 00:35:56.175516 systemd[1]: Removed slice kubepods-besteffort-pod45bfa60a_c71f_458b_8107_d8ab858817d5.slice. May 17 00:35:56.183643 kubelet[2423]: I0517 00:35:56.183611 2423 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-v4tpp\" (UniqueName: \"kubernetes.io/projected/45bfa60a-c71f-458b-8107-d8ab858817d5-kube-api-access-v4tpp\") on node \"ci-3510.3.7-n-6a88388a60\" DevicePath \"\"" May 17 00:35:56.183832 kubelet[2423]: I0517 00:35:56.183817 2423 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/45bfa60a-c71f-458b-8107-d8ab858817d5-whisker-backend-key-pair\") on node \"ci-3510.3.7-n-6a88388a60\" DevicePath \"\"" May 17 00:35:56.261204 kubelet[2423]: I0517 00:35:56.261127 2423 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-gtmbp" podStartSLOduration=1.929070155 podStartE2EDuration="25.261104812s" podCreationTimestamp="2025-05-17 00:35:31 +0000 UTC" firstStartedPulling="2025-05-17 00:35:31.830148045 +0000 UTC m=+17.981179620" lastFinishedPulling="2025-05-17 00:35:55.162182602 +0000 UTC m=+41.313214277" observedRunningTime="2025-05-17 00:35:56.259480769 +0000 UTC m=+42.410512344" watchObservedRunningTime="2025-05-17 00:35:56.261104812 +0000 UTC m=+42.412136387" May 17 00:35:56.299029 systemd[1]: Created slice kubepods-besteffort-pod403007e9_af7a_4a5d_9b90_5920611d9175.slice. May 17 00:35:56.386899 kubelet[2423]: I0517 00:35:56.386752 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/403007e9-af7a-4a5d-9b90-5920611d9175-whisker-backend-key-pair\") pod \"whisker-6564c697ff-q65rf\" (UID: \"403007e9-af7a-4a5d-9b90-5920611d9175\") " pod="calico-system/whisker-6564c697ff-q65rf" May 17 00:35:56.386899 kubelet[2423]: I0517 00:35:56.386815 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h5d82\" (UniqueName: \"kubernetes.io/projected/403007e9-af7a-4a5d-9b90-5920611d9175-kube-api-access-h5d82\") pod \"whisker-6564c697ff-q65rf\" (UID: \"403007e9-af7a-4a5d-9b90-5920611d9175\") " pod="calico-system/whisker-6564c697ff-q65rf" May 17 00:35:56.386899 kubelet[2423]: I0517 00:35:56.386851 2423 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/403007e9-af7a-4a5d-9b90-5920611d9175-whisker-ca-bundle\") pod \"whisker-6564c697ff-q65rf\" (UID: \"403007e9-af7a-4a5d-9b90-5920611d9175\") " pod="calico-system/whisker-6564c697ff-q65rf" May 17 00:35:56.609417 env[1435]: time="2025-05-17T00:35:56.607076580Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6564c697ff-q65rf,Uid:403007e9-af7a-4a5d-9b90-5920611d9175,Namespace:calico-system,Attempt:0,}" May 17 00:35:56.625946 kubelet[2423]: I0517 00:35:56.625912 2423 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:35:56.675000 audit[3701]: NETFILTER_CFG table=filter:102 family=2 entries=21 op=nft_register_rule pid=3701 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:56.675000 audit[3701]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc98460ff0 a2=0 a3=7ffc98460fdc items=0 ppid=2559 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:56.675000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:56.680000 audit[3701]: NETFILTER_CFG table=nat:103 family=2 entries=19 op=nft_register_chain pid=3701 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:56.680000 audit[3701]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc98460ff0 a2=0 a3=7ffc98460fdc items=0 ppid=2559 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:56.680000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:56.821441 systemd-networkd[1593]: cali9f82ada8962: Link UP May 17 00:35:56.828480 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:35:56.828579 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9f82ada8962: link becomes ready May 17 00:35:56.833153 systemd-networkd[1593]: cali9f82ada8962: Gained carrier May 17 00:35:56.849825 env[1435]: 2025-05-17 00:35:56.710 [INFO][3692] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:35:56.849825 env[1435]: 2025-05-17 00:35:56.720 [INFO][3692] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--6a88388a60-k8s-whisker--6564c697ff--q65rf-eth0 whisker-6564c697ff- calico-system 403007e9-af7a-4a5d-9b90-5920611d9175 928 0 2025-05-17 00:35:56 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:6564c697ff projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s ci-3510.3.7-n-6a88388a60 whisker-6564c697ff-q65rf eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali9f82ada8962 [] [] }} ContainerID="4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c" Namespace="calico-system" Pod="whisker-6564c697ff-q65rf" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-whisker--6564c697ff--q65rf-" May 17 00:35:56.849825 env[1435]: 2025-05-17 00:35:56.720 [INFO][3692] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c" Namespace="calico-system" Pod="whisker-6564c697ff-q65rf" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-whisker--6564c697ff--q65rf-eth0" May 17 00:35:56.849825 env[1435]: 2025-05-17 00:35:56.748 [INFO][3705] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c" HandleID="k8s-pod-network.4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c" Workload="ci--3510.3.7--n--6a88388a60-k8s-whisker--6564c697ff--q65rf-eth0" May 17 00:35:56.849825 env[1435]: 2025-05-17 00:35:56.749 [INFO][3705] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c" HandleID="k8s-pod-network.4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c" Workload="ci--3510.3.7--n--6a88388a60-k8s-whisker--6564c697ff--q65rf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000235240), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-6a88388a60", "pod":"whisker-6564c697ff-q65rf", "timestamp":"2025-05-17 00:35:56.74889158 +0000 UTC"}, Hostname:"ci-3510.3.7-n-6a88388a60", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:35:56.849825 env[1435]: 2025-05-17 00:35:56.749 [INFO][3705] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:56.849825 env[1435]: 2025-05-17 00:35:56.749 [INFO][3705] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:56.849825 env[1435]: 2025-05-17 00:35:56.749 [INFO][3705] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-6a88388a60' May 17 00:35:56.849825 env[1435]: 2025-05-17 00:35:56.756 [INFO][3705] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c" host="ci-3510.3.7-n-6a88388a60" May 17 00:35:56.849825 env[1435]: 2025-05-17 00:35:56.760 [INFO][3705] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-6a88388a60" May 17 00:35:56.849825 env[1435]: 2025-05-17 00:35:56.764 [INFO][3705] ipam/ipam.go 511: Trying affinity for 192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:35:56.849825 env[1435]: 2025-05-17 00:35:56.772 [INFO][3705] ipam/ipam.go 158: Attempting to load block cidr=192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:35:56.849825 env[1435]: 2025-05-17 00:35:56.774 [INFO][3705] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:35:56.849825 env[1435]: 2025-05-17 00:35:56.774 [INFO][3705] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.93.64/26 handle="k8s-pod-network.4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c" host="ci-3510.3.7-n-6a88388a60" May 17 00:35:56.849825 env[1435]: 2025-05-17 00:35:56.775 [INFO][3705] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c May 17 00:35:56.849825 env[1435]: 2025-05-17 00:35:56.780 [INFO][3705] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.93.64/26 handle="k8s-pod-network.4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c" host="ci-3510.3.7-n-6a88388a60" May 17 00:35:56.849825 env[1435]: 2025-05-17 00:35:56.790 [INFO][3705] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.93.65/26] block=192.168.93.64/26 handle="k8s-pod-network.4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c" host="ci-3510.3.7-n-6a88388a60" May 17 00:35:56.849825 env[1435]: 2025-05-17 00:35:56.790 [INFO][3705] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.93.65/26] handle="k8s-pod-network.4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c" host="ci-3510.3.7-n-6a88388a60" May 17 00:35:56.849825 env[1435]: 2025-05-17 00:35:56.790 [INFO][3705] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:56.849825 env[1435]: 2025-05-17 00:35:56.790 [INFO][3705] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.93.65/26] IPv6=[] ContainerID="4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c" HandleID="k8s-pod-network.4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c" Workload="ci--3510.3.7--n--6a88388a60-k8s-whisker--6564c697ff--q65rf-eth0" May 17 00:35:56.850897 env[1435]: 2025-05-17 00:35:56.793 [INFO][3692] cni-plugin/k8s.go 418: Populated endpoint ContainerID="4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c" Namespace="calico-system" Pod="whisker-6564c697ff-q65rf" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-whisker--6564c697ff--q65rf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-whisker--6564c697ff--q65rf-eth0", GenerateName:"whisker-6564c697ff-", Namespace:"calico-system", SelfLink:"", UID:"403007e9-af7a-4a5d-9b90-5920611d9175", ResourceVersion:"928", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"6564c697ff", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"", Pod:"whisker-6564c697ff-q65rf", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.93.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali9f82ada8962", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:56.850897 env[1435]: 2025-05-17 00:35:56.793 [INFO][3692] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.93.65/32] ContainerID="4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c" Namespace="calico-system" Pod="whisker-6564c697ff-q65rf" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-whisker--6564c697ff--q65rf-eth0" May 17 00:35:56.850897 env[1435]: 2025-05-17 00:35:56.793 [INFO][3692] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9f82ada8962 ContainerID="4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c" Namespace="calico-system" Pod="whisker-6564c697ff-q65rf" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-whisker--6564c697ff--q65rf-eth0" May 17 00:35:56.850897 env[1435]: 2025-05-17 00:35:56.834 [INFO][3692] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c" Namespace="calico-system" Pod="whisker-6564c697ff-q65rf" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-whisker--6564c697ff--q65rf-eth0" May 17 00:35:56.850897 env[1435]: 2025-05-17 00:35:56.834 [INFO][3692] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c" Namespace="calico-system" Pod="whisker-6564c697ff-q65rf" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-whisker--6564c697ff--q65rf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-whisker--6564c697ff--q65rf-eth0", GenerateName:"whisker-6564c697ff-", Namespace:"calico-system", SelfLink:"", UID:"403007e9-af7a-4a5d-9b90-5920611d9175", ResourceVersion:"928", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"6564c697ff", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c", Pod:"whisker-6564c697ff-q65rf", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.93.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali9f82ada8962", MAC:"3e:0a:99:a2:c3:5e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:56.850897 env[1435]: 2025-05-17 00:35:56.847 [INFO][3692] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c" Namespace="calico-system" Pod="whisker-6564c697ff-q65rf" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-whisker--6564c697ff--q65rf-eth0" May 17 00:35:56.864642 env[1435]: time="2025-05-17T00:35:56.864576379Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:35:56.864795 env[1435]: time="2025-05-17T00:35:56.864612680Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:35:56.864795 env[1435]: time="2025-05-17T00:35:56.864625580Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:35:56.864937 env[1435]: time="2025-05-17T00:35:56.864783484Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c pid=3729 runtime=io.containerd.runc.v2 May 17 00:35:56.876667 systemd[1]: Started cri-containerd-4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c.scope. May 17 00:35:56.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit: BPF prog-id=143 op=LOAD May 17 00:35:56.892000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3729 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:56.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464626339333630613565366531623239646639633237623537633838 May 17 00:35:56.892000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3729 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:56.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464626339333630613565366531623239646639633237623537633838 May 17 00:35:56.892000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.892000 audit: BPF prog-id=144 op=LOAD May 17 00:35:56.892000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002cdce0 items=0 ppid=3729 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:56.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464626339333630613565366531623239646639633237623537633838 May 17 00:35:56.893000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.893000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.893000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.893000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.893000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.893000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.893000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.893000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.893000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.893000 audit: BPF prog-id=145 op=LOAD May 17 00:35:56.893000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002cdd28 items=0 ppid=3729 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:56.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464626339333630613565366531623239646639633237623537633838 May 17 00:35:56.893000 audit: BPF prog-id=145 op=UNLOAD May 17 00:35:56.893000 audit: BPF prog-id=144 op=UNLOAD May 17 00:35:56.893000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.893000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.893000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.893000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.893000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.893000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.893000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.893000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.893000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.893000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:56.893000 audit: BPF prog-id=146 op=LOAD May 17 00:35:56.893000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000352138 items=0 ppid=3729 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:56.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464626339333630613565366531623239646639633237623537633838 May 17 00:35:56.922643 env[1435]: time="2025-05-17T00:35:56.922538931Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6564c697ff-q65rf,Uid:403007e9-af7a-4a5d-9b90-5920611d9175,Namespace:calico-system,Attempt:0,} returns sandbox id \"4dbc9360a5e6e1b29df9c27b57c885ad837695663c1910f8d215efb967460c9c\"" May 17 00:35:56.924459 env[1435]: time="2025-05-17T00:35:56.924300278Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:35:57.100407 env[1435]: time="2025-05-17T00:35:57.100329741Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:35:57.105601 env[1435]: time="2025-05-17T00:35:57.105546178Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:35:57.105841 kubelet[2423]: E0517 00:35:57.105807 2423 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:35:57.106174 kubelet[2423]: E0517 00:35:57.105862 2423 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:35:57.106233 kubelet[2423]: E0517 00:35:57.106040 2423 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:f4c4fa38b65b452f8870b25fcd45b50b,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-h5d82,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6564c697ff-q65rf_calico-system(403007e9-af7a-4a5d-9b90-5920611d9175): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:35:57.108374 env[1435]: time="2025-05-17T00:35:57.108341352Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:35:57.287686 env[1435]: time="2025-05-17T00:35:57.287627857Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:35:57.291448 env[1435]: time="2025-05-17T00:35:57.291376455Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:35:57.291700 kubelet[2423]: E0517 00:35:57.291652 2423 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:35:57.291827 kubelet[2423]: E0517 00:35:57.291716 2423 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:35:57.291916 kubelet[2423]: E0517 00:35:57.291869 2423 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-h5d82,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6564c697ff-q65rf_calico-system(403007e9-af7a-4a5d-9b90-5920611d9175): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:35:57.293889 kubelet[2423]: E0517 00:35:57.293818 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6564c697ff-q65rf" podUID="403007e9-af7a-4a5d-9b90-5920611d9175" May 17 00:35:57.398000 audit[3842]: AVC avc: denied { write } for pid=3842 comm="tee" name="fd" dev="proc" ino=30090 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:35:57.401000 audit[3850]: AVC avc: denied { write } for pid=3850 comm="tee" name="fd" dev="proc" ino=29656 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:35:57.401000 audit[3850]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff669ed7cf a2=241 a3=1b6 items=1 ppid=3808 pid=3850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.401000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:35:57.401000 audit: PATH item=0 name="/dev/fd/63" inode=29653 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.401000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:35:57.398000 audit[3842]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca65f37bf a2=241 a3=1b6 items=1 ppid=3803 pid=3842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.398000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:35:57.398000 audit: PATH item=0 name="/dev/fd/63" inode=30077 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.398000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:35:57.415000 audit[3835]: AVC avc: denied { write } for pid=3835 comm="tee" name="fd" dev="proc" ino=30095 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:35:57.417000 audit[3848]: AVC avc: denied { write } for pid=3848 comm="tee" name="fd" dev="proc" ino=30098 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:35:57.415000 audit[3835]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcdaf657d1 a2=241 a3=1b6 items=1 ppid=3791 pid=3835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.423000 audit[3862]: AVC avc: denied { write } for pid=3862 comm="tee" name="fd" dev="proc" ino=29662 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:35:57.423000 audit[3862]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff730b07cf a2=241 a3=1b6 items=1 ppid=3797 pid=3862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.423000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:35:57.423000 audit: PATH item=0 name="/dev/fd/63" inode=30099 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.423000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:35:57.415000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:35:57.415000 audit: PATH item=0 name="/dev/fd/63" inode=30069 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.415000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:35:57.428000 audit[3839]: AVC avc: denied { write } for pid=3839 comm="tee" name="fd" dev="proc" ino=29666 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:35:57.428000 audit[3839]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc714f7cf a2=241 a3=1b6 items=1 ppid=3792 pid=3839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.428000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:35:57.428000 audit: PATH item=0 name="/dev/fd/63" inode=29650 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.428000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:35:57.417000 audit[3848]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff195e37d0 a2=241 a3=1b6 items=1 ppid=3798 pid=3848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.417000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:35:57.417000 audit: PATH item=0 name="/dev/fd/63" inode=30087 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.417000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:35:57.436000 audit[3845]: AVC avc: denied { write } for pid=3845 comm="tee" name="fd" dev="proc" ino=30104 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:35:57.436000 audit[3845]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd4d0f17c0 a2=241 a3=1b6 items=1 ppid=3795 pid=3845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.436000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:35:57.436000 audit: PATH item=0 name="/dev/fd/63" inode=30082 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:35:57.436000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:35:57.723000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.723000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.723000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.723000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.723000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.723000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.723000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.723000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.723000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.723000 audit: BPF prog-id=147 op=LOAD May 17 00:35:57.723000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc7645ea90 a2=98 a3=3 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.723000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.725000 audit: BPF prog-id=147 op=UNLOAD May 17 00:35:57.725000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.725000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.725000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.725000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.725000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.725000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.725000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.725000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.725000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.725000 audit: BPF prog-id=148 op=LOAD May 17 00:35:57.725000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc7645e880 a2=94 a3=54428f items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.725000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.725000 audit: BPF prog-id=148 op=UNLOAD May 17 00:35:57.725000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.725000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.725000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.725000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.725000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.725000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.725000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.725000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.725000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.725000 audit: BPF prog-id=149 op=LOAD May 17 00:35:57.725000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc7645e8b0 a2=94 a3=2 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.725000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.726000 audit: BPF prog-id=149 op=UNLOAD May 17 00:35:57.854000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.854000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.854000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.854000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.854000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.854000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.854000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.854000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.854000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.854000 audit: BPF prog-id=150 op=LOAD May 17 00:35:57.854000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc7645e770 a2=94 a3=1 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.854000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.854000 audit: BPF prog-id=150 op=UNLOAD May 17 00:35:57.854000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.854000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc7645e840 a2=50 a3=7ffc7645e920 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.854000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.864000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.864000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7645e780 a2=28 a3=0 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.864000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.864000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.864000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7645e7b0 a2=28 a3=0 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.864000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.864000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.864000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7645e6c0 a2=28 a3=0 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.864000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.864000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.864000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7645e7d0 a2=28 a3=0 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.864000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.864000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.864000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7645e7b0 a2=28 a3=0 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.864000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.864000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.864000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7645e7a0 a2=28 a3=0 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.864000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.864000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.864000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7645e7d0 a2=28 a3=0 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.864000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.864000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.864000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7645e7b0 a2=28 a3=0 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.864000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.864000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.864000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7645e7d0 a2=28 a3=0 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.864000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.864000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.864000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7645e7a0 a2=28 a3=0 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.864000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.864000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.864000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7645e810 a2=28 a3=0 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.864000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.865000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc7645e5c0 a2=50 a3=1 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.865000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.865000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit: BPF prog-id=151 op=LOAD May 17 00:35:57.865000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc7645e5c0 a2=94 a3=5 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.865000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.865000 audit: BPF prog-id=151 op=UNLOAD May 17 00:35:57.865000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc7645e670 a2=50 a3=1 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.865000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.865000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc7645e790 a2=4 a3=38 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.865000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.865000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { confidentiality } for pid=3901 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:35:57.865000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc7645e7e0 a2=94 a3=6 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.865000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.865000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.865000 audit[3901]: AVC avc: denied { confidentiality } for pid=3901 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:35:57.865000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc7645df90 a2=94 a3=88 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.865000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.866000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.866000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.866000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.866000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.866000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.866000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.866000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.866000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.866000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc7645df90 a2=94 a3=88 items=0 ppid=3794 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.866000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:35:57.875000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit: BPF prog-id=152 op=LOAD May 17 00:35:57.875000 audit[3906]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd8bd53e90 a2=98 a3=1999999999999999 items=0 ppid=3794 pid=3906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.875000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:35:57.875000 audit: BPF prog-id=152 op=UNLOAD May 17 00:35:57.875000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit: BPF prog-id=153 op=LOAD May 17 00:35:57.875000 audit[3906]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd8bd53d70 a2=94 a3=ffff items=0 ppid=3794 pid=3906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.875000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:35:57.875000 audit: BPF prog-id=153 op=UNLOAD May 17 00:35:57.875000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { perfmon } for pid=3906 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit[3906]: AVC avc: denied { bpf } for pid=3906 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:57.875000 audit: BPF prog-id=154 op=LOAD May 17 00:35:57.875000 audit[3906]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd8bd53db0 a2=94 a3=7ffd8bd53f90 items=0 ppid=3794 pid=3906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:57.875000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:35:57.875000 audit: BPF prog-id=154 op=UNLOAD May 17 00:35:57.972103 env[1435]: time="2025-05-17T00:35:57.972061120Z" level=info msg="StopPodSandbox for \"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\"" May 17 00:35:57.974153 kubelet[2423]: I0517 00:35:57.974115 2423 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="45bfa60a-c71f-458b-8107-d8ab858817d5" path="/var/lib/kubelet/pods/45bfa60a-c71f-458b-8107-d8ab858817d5/volumes" May 17 00:35:58.070087 env[1435]: 2025-05-17 00:35:58.037 [INFO][3926] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" May 17 00:35:58.070087 env[1435]: 2025-05-17 00:35:58.038 [INFO][3926] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" iface="eth0" netns="/var/run/netns/cni-c881451a-3280-64f9-4cad-c86428263995" May 17 00:35:58.070087 env[1435]: 2025-05-17 00:35:58.038 [INFO][3926] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" iface="eth0" netns="/var/run/netns/cni-c881451a-3280-64f9-4cad-c86428263995" May 17 00:35:58.070087 env[1435]: 2025-05-17 00:35:58.038 [INFO][3926] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" iface="eth0" netns="/var/run/netns/cni-c881451a-3280-64f9-4cad-c86428263995" May 17 00:35:58.070087 env[1435]: 2025-05-17 00:35:58.038 [INFO][3926] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" May 17 00:35:58.070087 env[1435]: 2025-05-17 00:35:58.038 [INFO][3926] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" May 17 00:35:58.070087 env[1435]: 2025-05-17 00:35:58.058 [INFO][3936] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" HandleID="k8s-pod-network.e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0" May 17 00:35:58.070087 env[1435]: 2025-05-17 00:35:58.059 [INFO][3936] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:58.070087 env[1435]: 2025-05-17 00:35:58.059 [INFO][3936] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:58.070087 env[1435]: 2025-05-17 00:35:58.066 [WARNING][3936] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" HandleID="k8s-pod-network.e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0" May 17 00:35:58.070087 env[1435]: 2025-05-17 00:35:58.066 [INFO][3936] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" HandleID="k8s-pod-network.e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0" May 17 00:35:58.070087 env[1435]: 2025-05-17 00:35:58.067 [INFO][3936] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:58.070087 env[1435]: 2025-05-17 00:35:58.068 [INFO][3926] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" May 17 00:35:58.074621 systemd[1]: run-netns-cni\x2dc881451a\x2d3280\x2d64f9\x2d4cad\x2dc86428263995.mount: Deactivated successfully. May 17 00:35:58.082425 env[1435]: time="2025-05-17T00:35:58.080426522Z" level=info msg="TearDown network for sandbox \"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\" successfully" May 17 00:35:58.082425 env[1435]: time="2025-05-17T00:35:58.080477923Z" level=info msg="StopPodSandbox for \"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\" returns successfully" May 17 00:35:58.082425 env[1435]: time="2025-05-17T00:35:58.081203442Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7664dbdf7c-5c5jt,Uid:68bd3f92-8819-482c-a4dc-243b1c1b6b66,Namespace:calico-apiserver,Attempt:1,}" May 17 00:35:58.092797 systemd-networkd[1593]: cali9f82ada8962: Gained IPv6LL May 17 00:35:58.108088 systemd-networkd[1593]: vxlan.calico: Link UP May 17 00:35:58.108096 systemd-networkd[1593]: vxlan.calico: Gained carrier May 17 00:35:58.131000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.131000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.131000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.131000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.131000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.131000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.131000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.131000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.131000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.131000 audit: BPF prog-id=155 op=LOAD May 17 00:35:58.131000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc00cc3720 a2=98 a3=0 items=0 ppid=3794 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.131000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:58.131000 audit: BPF prog-id=155 op=UNLOAD May 17 00:35:58.131000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.131000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.131000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.131000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.131000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.131000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.131000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.131000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.131000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.131000 audit: BPF prog-id=156 op=LOAD May 17 00:35:58.131000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc00cc3530 a2=94 a3=54428f items=0 ppid=3794 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.131000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:58.132000 audit: BPF prog-id=156 op=UNLOAD May 17 00:35:58.132000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit: BPF prog-id=157 op=LOAD May 17 00:35:58.132000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc00cc3560 a2=94 a3=2 items=0 ppid=3794 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.132000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:58.132000 audit: BPF prog-id=157 op=UNLOAD May 17 00:35:58.132000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc00cc3430 a2=28 a3=0 items=0 ppid=3794 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.132000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc00cc3460 a2=28 a3=0 items=0 ppid=3794 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.132000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc00cc3370 a2=28 a3=0 items=0 ppid=3794 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.132000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc00cc3480 a2=28 a3=0 items=0 ppid=3794 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.132000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc00cc3460 a2=28 a3=0 items=0 ppid=3794 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.132000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc00cc3450 a2=28 a3=0 items=0 ppid=3794 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.132000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc00cc3480 a2=28 a3=0 items=0 ppid=3794 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.132000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc00cc3460 a2=28 a3=0 items=0 ppid=3794 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.132000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc00cc3480 a2=28 a3=0 items=0 ppid=3794 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.132000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc00cc3450 a2=28 a3=0 items=0 ppid=3794 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.132000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc00cc34c0 a2=28 a3=0 items=0 ppid=3794 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.132000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.132000 audit: BPF prog-id=158 op=LOAD May 17 00:35:58.132000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc00cc3330 a2=94 a3=0 items=0 ppid=3794 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.132000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:58.132000 audit: BPF prog-id=158 op=UNLOAD May 17 00:35:58.133000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc00cc3320 a2=50 a3=2800 items=0 ppid=3794 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.133000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:58.133000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc00cc3320 a2=50 a3=2800 items=0 ppid=3794 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.133000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:58.133000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit: BPF prog-id=159 op=LOAD May 17 00:35:58.133000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc00cc2b40 a2=94 a3=2 items=0 ppid=3794 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.133000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:58.133000 audit: BPF prog-id=159 op=UNLOAD May 17 00:35:58.133000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.133000 audit: BPF prog-id=160 op=LOAD May 17 00:35:58.133000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc00cc2c40 a2=94 a3=30 items=0 ppid=3794 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.133000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit: BPF prog-id=161 op=LOAD May 17 00:35:58.136000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc8aa3fad0 a2=98 a3=0 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.136000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.136000 audit: BPF prog-id=161 op=UNLOAD May 17 00:35:58.136000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit: BPF prog-id=162 op=LOAD May 17 00:35:58.136000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc8aa3f8c0 a2=94 a3=54428f items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.136000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.136000 audit: BPF prog-id=162 op=UNLOAD May 17 00:35:58.136000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.136000 audit: BPF prog-id=163 op=LOAD May 17 00:35:58.136000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc8aa3f8f0 a2=94 a3=2 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.136000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.136000 audit: BPF prog-id=163 op=UNLOAD May 17 00:35:58.192066 kubelet[2423]: E0517 00:35:58.192013 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6564c697ff-q65rf" podUID="403007e9-af7a-4a5d-9b90-5920611d9175" May 17 00:35:58.235000 audit[3973]: NETFILTER_CFG table=filter:104 family=2 entries=20 op=nft_register_rule pid=3973 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:58.235000 audit[3973]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffefce77950 a2=0 a3=7ffefce7793c items=0 ppid=2559 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.235000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:58.243000 audit[3973]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3973 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:58.243000 audit[3973]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffefce77950 a2=0 a3=0 items=0 ppid=2559 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.243000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:58.341589 systemd-networkd[1593]: cali439b28ae29e: Link UP May 17 00:35:58.354607 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali439b28ae29e: link becomes ready May 17 00:35:58.354453 systemd-networkd[1593]: cali439b28ae29e: Gained carrier May 17 00:35:58.370296 env[1435]: 2025-05-17 00:35:58.238 [INFO][3961] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0 calico-apiserver-7664dbdf7c- calico-apiserver 68bd3f92-8819-482c-a4dc-243b1c1b6b66 951 0 2025-05-17 00:35:28 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7664dbdf7c projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-6a88388a60 calico-apiserver-7664dbdf7c-5c5jt eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali439b28ae29e [] [] }} ContainerID="ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df" Namespace="calico-apiserver" Pod="calico-apiserver-7664dbdf7c-5c5jt" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-" May 17 00:35:58.370296 env[1435]: 2025-05-17 00:35:58.238 [INFO][3961] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df" Namespace="calico-apiserver" Pod="calico-apiserver-7664dbdf7c-5c5jt" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0" May 17 00:35:58.370296 env[1435]: 2025-05-17 00:35:58.273 [INFO][3975] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df" HandleID="k8s-pod-network.ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0" May 17 00:35:58.370296 env[1435]: 2025-05-17 00:35:58.273 [INFO][3975] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df" HandleID="k8s-pod-network.ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1020), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-6a88388a60", "pod":"calico-apiserver-7664dbdf7c-5c5jt", "timestamp":"2025-05-17 00:35:58.273296982 +0000 UTC"}, Hostname:"ci-3510.3.7-n-6a88388a60", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:35:58.370296 env[1435]: 2025-05-17 00:35:58.273 [INFO][3975] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:58.370296 env[1435]: 2025-05-17 00:35:58.273 [INFO][3975] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:58.370296 env[1435]: 2025-05-17 00:35:58.273 [INFO][3975] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-6a88388a60' May 17 00:35:58.370296 env[1435]: 2025-05-17 00:35:58.281 [INFO][3975] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df" host="ci-3510.3.7-n-6a88388a60" May 17 00:35:58.370296 env[1435]: 2025-05-17 00:35:58.287 [INFO][3975] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-6a88388a60" May 17 00:35:58.370296 env[1435]: 2025-05-17 00:35:58.302 [INFO][3975] ipam/ipam.go 511: Trying affinity for 192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:35:58.370296 env[1435]: 2025-05-17 00:35:58.306 [INFO][3975] ipam/ipam.go 158: Attempting to load block cidr=192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:35:58.370296 env[1435]: 2025-05-17 00:35:58.311 [INFO][3975] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:35:58.370296 env[1435]: 2025-05-17 00:35:58.311 [INFO][3975] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.93.64/26 handle="k8s-pod-network.ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df" host="ci-3510.3.7-n-6a88388a60" May 17 00:35:58.370296 env[1435]: 2025-05-17 00:35:58.313 [INFO][3975] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df May 17 00:35:58.370296 env[1435]: 2025-05-17 00:35:58.320 [INFO][3975] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.93.64/26 handle="k8s-pod-network.ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df" host="ci-3510.3.7-n-6a88388a60" May 17 00:35:58.370296 env[1435]: 2025-05-17 00:35:58.327 [INFO][3975] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.93.66/26] block=192.168.93.64/26 handle="k8s-pod-network.ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df" host="ci-3510.3.7-n-6a88388a60" May 17 00:35:58.370296 env[1435]: 2025-05-17 00:35:58.327 [INFO][3975] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.93.66/26] handle="k8s-pod-network.ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df" host="ci-3510.3.7-n-6a88388a60" May 17 00:35:58.370296 env[1435]: 2025-05-17 00:35:58.327 [INFO][3975] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:58.370296 env[1435]: 2025-05-17 00:35:58.327 [INFO][3975] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.93.66/26] IPv6=[] ContainerID="ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df" HandleID="k8s-pod-network.ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0" May 17 00:35:58.371264 env[1435]: 2025-05-17 00:35:58.329 [INFO][3961] cni-plugin/k8s.go 418: Populated endpoint ContainerID="ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df" Namespace="calico-apiserver" Pod="calico-apiserver-7664dbdf7c-5c5jt" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0", GenerateName:"calico-apiserver-7664dbdf7c-", Namespace:"calico-apiserver", SelfLink:"", UID:"68bd3f92-8819-482c-a4dc-243b1c1b6b66", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7664dbdf7c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"", Pod:"calico-apiserver-7664dbdf7c-5c5jt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.93.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali439b28ae29e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:58.371264 env[1435]: 2025-05-17 00:35:58.329 [INFO][3961] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.93.66/32] ContainerID="ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df" Namespace="calico-apiserver" Pod="calico-apiserver-7664dbdf7c-5c5jt" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0" May 17 00:35:58.371264 env[1435]: 2025-05-17 00:35:58.329 [INFO][3961] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali439b28ae29e ContainerID="ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df" Namespace="calico-apiserver" Pod="calico-apiserver-7664dbdf7c-5c5jt" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0" May 17 00:35:58.371264 env[1435]: 2025-05-17 00:35:58.354 [INFO][3961] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df" Namespace="calico-apiserver" Pod="calico-apiserver-7664dbdf7c-5c5jt" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0" May 17 00:35:58.371264 env[1435]: 2025-05-17 00:35:58.355 [INFO][3961] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df" Namespace="calico-apiserver" Pod="calico-apiserver-7664dbdf7c-5c5jt" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0", GenerateName:"calico-apiserver-7664dbdf7c-", Namespace:"calico-apiserver", SelfLink:"", UID:"68bd3f92-8819-482c-a4dc-243b1c1b6b66", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7664dbdf7c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df", Pod:"calico-apiserver-7664dbdf7c-5c5jt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.93.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali439b28ae29e", MAC:"ea:84:12:76:51:60", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:35:58.371264 env[1435]: 2025-05-17 00:35:58.368 [INFO][3961] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df" Namespace="calico-apiserver" Pod="calico-apiserver-7664dbdf7c-5c5jt" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0" May 17 00:35:58.387509 env[1435]: time="2025-05-17T00:35:58.387424517Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:35:58.387509 env[1435]: time="2025-05-17T00:35:58.387475918Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:35:58.387771 env[1435]: time="2025-05-17T00:35:58.387490119Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:35:58.387930 env[1435]: time="2025-05-17T00:35:58.387896229Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df pid=3997 runtime=io.containerd.runc.v2 May 17 00:35:58.413768 systemd[1]: Started cri-containerd-ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df.scope. May 17 00:35:58.430224 systemd[1]: run-containerd-runc-k8s.io-ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df-runc.IJpYCY.mount: Deactivated successfully. May 17 00:35:58.429000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.429000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.429000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.429000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.429000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.429000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.429000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.429000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.429000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.429000 audit: BPF prog-id=164 op=LOAD May 17 00:35:58.429000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc8aa3f7b0 a2=94 a3=1 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.429000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.429000 audit: BPF prog-id=164 op=UNLOAD May 17 00:35:58.429000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.429000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc8aa3f880 a2=50 a3=7ffc8aa3f960 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.429000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.444000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.444000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8aa3f7c0 a2=28 a3=0 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.444000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.444000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.444000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8aa3f7f0 a2=28 a3=0 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.444000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.444000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.444000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8aa3f700 a2=28 a3=0 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.444000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.444000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.444000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8aa3f810 a2=28 a3=0 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.444000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.444000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.444000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8aa3f7f0 a2=28 a3=0 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.444000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.444000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.444000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8aa3f7e0 a2=28 a3=0 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.444000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.444000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.444000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8aa3f810 a2=28 a3=0 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.444000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.444000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.444000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8aa3f7f0 a2=28 a3=0 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.444000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.444000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.444000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8aa3f810 a2=28 a3=0 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.444000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.444000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.444000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8aa3f7e0 a2=28 a3=0 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.444000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8aa3f850 a2=28 a3=0 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc8aa3f600 a2=50 a3=1 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit: BPF prog-id=165 op=LOAD May 17 00:35:58.445000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc8aa3f600 a2=94 a3=5 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.445000 audit: BPF prog-id=165 op=UNLOAD May 17 00:35:58.445000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc8aa3f6b0 a2=50 a3=1 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc8aa3f7d0 a2=4 a3=38 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { confidentiality } for pid=3957 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:35:58.445000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc8aa3f820 a2=94 a3=6 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.445000 audit[3957]: AVC avc: denied { confidentiality } for pid=3957 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:35:58.445000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc8aa3efd0 a2=94 a3=88 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.446000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.446000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.446000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.446000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.446000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.446000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.446000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.446000 audit[3957]: AVC avc: denied { perfmon } for pid=3957 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.446000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc8aa3efd0 a2=94 a3=88 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.446000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.450000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.450000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8aa40a00 a2=10 a3=f8f00800 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.450000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.450000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.450000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8aa408a0 a2=10 a3=3 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.450000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.450000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.450000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8aa40840 a2=10 a3=3 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.450000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.450000 audit[3957]: AVC avc: denied { bpf } for pid=3957 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.450000 audit[3957]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8aa40840 a2=10 a3=7 items=0 ppid=3794 pid=3957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.450000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:35:58.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.455000 audit: BPF prog-id=166 op=LOAD May 17 00:35:58.456000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3997 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365636366323466313930373962376137333331346664656134346162 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3997 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365636366323466313930373962376137333331346664656134346162 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit: BPF prog-id=167 op=LOAD May 17 00:35:58.456000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000354400 items=0 ppid=3997 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365636366323466313930373962376137333331346664656134346162 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit: BPF prog-id=168 op=LOAD May 17 00:35:58.456000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000354448 items=0 ppid=3997 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365636366323466313930373962376137333331346664656134346162 May 17 00:35:58.456000 audit: BPF prog-id=168 op=UNLOAD May 17 00:35:58.456000 audit: BPF prog-id=167 op=UNLOAD May 17 00:35:58.456000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:35:58.456000 audit: BPF prog-id=169 op=LOAD May 17 00:35:58.456000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000354858 items=0 ppid=3997 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365636366323466313930373962376137333331346664656134346162 May 17 00:35:58.457000 audit: BPF prog-id=160 op=UNLOAD May 17 00:35:58.457000 audit[4020]: SYSCALL arch=c000003e syscall=165 success=yes exit=0 a0=c00019c7d0 a1=c00019c7e0 a2=c00019c7d6 a3=1 items=0 ppid=4008 pid=4020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc:[2:INIT]" exe=2F6D656D66643A72756E635F636C6F6E65643A2F70726F632F73656C662F657865202864656C6574656429 subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.457000 audit: PROCTITLE proctitle=72756E6300696E6974 May 17 00:35:58.494384 env[1435]: time="2025-05-17T00:35:58.494336467Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7664dbdf7c-5c5jt,Uid:68bd3f92-8819-482c-a4dc-243b1c1b6b66,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df\"" May 17 00:35:58.498200 env[1435]: time="2025-05-17T00:35:58.496202815Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:35:58.778000 audit[4057]: NETFILTER_CFG table=mangle:106 family=2 entries=16 op=nft_register_chain pid=4057 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:35:58.778000 audit[4057]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe01b26db0 a2=0 a3=7ffe01b26d9c items=0 ppid=3794 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.778000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:35:58.858000 audit[4055]: NETFILTER_CFG table=nat:107 family=2 entries=15 op=nft_register_chain pid=4055 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:35:58.858000 audit[4055]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd14b42d70 a2=0 a3=7ffd14b42d5c items=0 ppid=3794 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.858000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:35:58.860000 audit[4058]: NETFILTER_CFG table=raw:108 family=2 entries=21 op=nft_register_chain pid=4058 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:35:58.860000 audit[4058]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffeecf81ac0 a2=0 a3=7ffeecf81aac items=0 ppid=3794 pid=4058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.860000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:35:58.860000 audit[4056]: NETFILTER_CFG table=filter:109 family=2 entries=94 op=nft_register_chain pid=4056 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:35:58.860000 audit[4056]: SYSCALL arch=c000003e syscall=46 success=yes exit=53116 a0=3 a1=7ffeaa580df0 a2=0 a3=7ffeaa580ddc items=0 ppid=3794 pid=4056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.860000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:35:58.974000 audit[4071]: NETFILTER_CFG table=filter:110 family=2 entries=50 op=nft_register_chain pid=4071 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:35:58.974000 audit[4071]: SYSCALL arch=c000003e syscall=46 success=yes exit=28208 a0=3 a1=7fff8900ffa0 a2=0 a3=7fff8900ff8c items=0 ppid=3794 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:58.974000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:35:59.244647 systemd-networkd[1593]: vxlan.calico: Gained IPv6LL May 17 00:35:59.500573 systemd-networkd[1593]: cali439b28ae29e: Gained IPv6LL May 17 00:35:59.976588 env[1435]: time="2025-05-17T00:35:59.975616664Z" level=info msg="StopPodSandbox for \"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\"" May 17 00:35:59.977838 env[1435]: time="2025-05-17T00:35:59.977789119Z" level=info msg="StopPodSandbox for \"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\"" May 17 00:36:00.134524 env[1435]: 2025-05-17 00:36:00.073 [INFO][4100] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" May 17 00:36:00.134524 env[1435]: 2025-05-17 00:36:00.073 [INFO][4100] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" iface="eth0" netns="/var/run/netns/cni-f8630137-baef-f7d5-2658-46a47ddb71a0" May 17 00:36:00.134524 env[1435]: 2025-05-17 00:36:00.073 [INFO][4100] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" iface="eth0" netns="/var/run/netns/cni-f8630137-baef-f7d5-2658-46a47ddb71a0" May 17 00:36:00.134524 env[1435]: 2025-05-17 00:36:00.075 [INFO][4100] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" iface="eth0" netns="/var/run/netns/cni-f8630137-baef-f7d5-2658-46a47ddb71a0" May 17 00:36:00.134524 env[1435]: 2025-05-17 00:36:00.075 [INFO][4100] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" May 17 00:36:00.134524 env[1435]: 2025-05-17 00:36:00.075 [INFO][4100] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" May 17 00:36:00.134524 env[1435]: 2025-05-17 00:36:00.107 [INFO][4115] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" HandleID="k8s-pod-network.e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0" May 17 00:36:00.134524 env[1435]: 2025-05-17 00:36:00.107 [INFO][4115] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:00.134524 env[1435]: 2025-05-17 00:36:00.107 [INFO][4115] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:00.134524 env[1435]: 2025-05-17 00:36:00.123 [WARNING][4115] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" HandleID="k8s-pod-network.e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0" May 17 00:36:00.134524 env[1435]: 2025-05-17 00:36:00.123 [INFO][4115] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" HandleID="k8s-pod-network.e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0" May 17 00:36:00.134524 env[1435]: 2025-05-17 00:36:00.125 [INFO][4115] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:00.134524 env[1435]: 2025-05-17 00:36:00.131 [INFO][4100] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" May 17 00:36:00.143602 env[1435]: time="2025-05-17T00:36:00.134671807Z" level=info msg="TearDown network for sandbox \"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\" successfully" May 17 00:36:00.143602 env[1435]: time="2025-05-17T00:36:00.134710008Z" level=info msg="StopPodSandbox for \"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\" returns successfully" May 17 00:36:00.138222 systemd[1]: run-netns-cni\x2df8630137\x2dbaef\x2df7d5\x2d2658\x2d46a47ddb71a0.mount: Deactivated successfully. May 17 00:36:00.144254 env[1435]: time="2025-05-17T00:36:00.144214643Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-6swpt,Uid:633d4cfc-246e-48fa-a39a-e5371f8453be,Namespace:kube-system,Attempt:1,}" May 17 00:36:00.146623 env[1435]: 2025-05-17 00:36:00.049 [INFO][4091] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" May 17 00:36:00.146623 env[1435]: 2025-05-17 00:36:00.050 [INFO][4091] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" iface="eth0" netns="/var/run/netns/cni-965c1c99-c18c-b6b6-6349-e37f54cf9fa9" May 17 00:36:00.146623 env[1435]: 2025-05-17 00:36:00.050 [INFO][4091] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" iface="eth0" netns="/var/run/netns/cni-965c1c99-c18c-b6b6-6349-e37f54cf9fa9" May 17 00:36:00.146623 env[1435]: 2025-05-17 00:36:00.050 [INFO][4091] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" iface="eth0" netns="/var/run/netns/cni-965c1c99-c18c-b6b6-6349-e37f54cf9fa9" May 17 00:36:00.146623 env[1435]: 2025-05-17 00:36:00.050 [INFO][4091] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" May 17 00:36:00.146623 env[1435]: 2025-05-17 00:36:00.050 [INFO][4091] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" May 17 00:36:00.146623 env[1435]: 2025-05-17 00:36:00.123 [INFO][4109] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" HandleID="k8s-pod-network.68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" Workload="ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0" May 17 00:36:00.146623 env[1435]: 2025-05-17 00:36:00.123 [INFO][4109] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:00.146623 env[1435]: 2025-05-17 00:36:00.125 [INFO][4109] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:00.146623 env[1435]: 2025-05-17 00:36:00.137 [WARNING][4109] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" HandleID="k8s-pod-network.68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" Workload="ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0" May 17 00:36:00.146623 env[1435]: 2025-05-17 00:36:00.138 [INFO][4109] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" HandleID="k8s-pod-network.68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" Workload="ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0" May 17 00:36:00.146623 env[1435]: 2025-05-17 00:36:00.140 [INFO][4109] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:00.146623 env[1435]: 2025-05-17 00:36:00.144 [INFO][4091] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" May 17 00:36:00.153357 systemd[1]: run-netns-cni\x2d965c1c99\x2dc18c\x2db6b6\x2d6349\x2de37f54cf9fa9.mount: Deactivated successfully. May 17 00:36:00.158072 env[1435]: time="2025-05-17T00:36:00.158016984Z" level=info msg="TearDown network for sandbox \"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\" successfully" May 17 00:36:00.158225 env[1435]: time="2025-05-17T00:36:00.158183088Z" level=info msg="StopPodSandbox for \"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\" returns successfully" May 17 00:36:00.164429 env[1435]: time="2025-05-17T00:36:00.164031033Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wk56l,Uid:15b079d6-0080-4890-bd00-77adf92b4b29,Namespace:calico-system,Attempt:1,}" May 17 00:36:00.463495 systemd-networkd[1593]: calieb35e1ee013: Link UP May 17 00:36:00.478495 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:36:00.488424 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calieb35e1ee013: link becomes ready May 17 00:36:00.492153 systemd-networkd[1593]: calieb35e1ee013: Gained carrier May 17 00:36:00.502364 env[1435]: 2025-05-17 00:36:00.300 [INFO][4122] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0 coredns-674b8bbfcf- kube-system 633d4cfc-246e-48fa-a39a-e5371f8453be 969 0 2025-05-17 00:35:19 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-6a88388a60 coredns-674b8bbfcf-6swpt eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calieb35e1ee013 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2" Namespace="kube-system" Pod="coredns-674b8bbfcf-6swpt" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-" May 17 00:36:00.502364 env[1435]: 2025-05-17 00:36:00.301 [INFO][4122] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2" Namespace="kube-system" Pod="coredns-674b8bbfcf-6swpt" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0" May 17 00:36:00.502364 env[1435]: 2025-05-17 00:36:00.399 [INFO][4138] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2" HandleID="k8s-pod-network.a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0" May 17 00:36:00.502364 env[1435]: 2025-05-17 00:36:00.400 [INFO][4138] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2" HandleID="k8s-pod-network.a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ad800), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-6a88388a60", "pod":"coredns-674b8bbfcf-6swpt", "timestamp":"2025-05-17 00:36:00.399977564 +0000 UTC"}, Hostname:"ci-3510.3.7-n-6a88388a60", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:36:00.502364 env[1435]: 2025-05-17 00:36:00.400 [INFO][4138] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:00.502364 env[1435]: 2025-05-17 00:36:00.400 [INFO][4138] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:00.502364 env[1435]: 2025-05-17 00:36:00.401 [INFO][4138] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-6a88388a60' May 17 00:36:00.502364 env[1435]: 2025-05-17 00:36:00.412 [INFO][4138] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:00.502364 env[1435]: 2025-05-17 00:36:00.418 [INFO][4138] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-6a88388a60" May 17 00:36:00.502364 env[1435]: 2025-05-17 00:36:00.424 [INFO][4138] ipam/ipam.go 511: Trying affinity for 192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:36:00.502364 env[1435]: 2025-05-17 00:36:00.430 [INFO][4138] ipam/ipam.go 158: Attempting to load block cidr=192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:36:00.502364 env[1435]: 2025-05-17 00:36:00.432 [INFO][4138] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:36:00.502364 env[1435]: 2025-05-17 00:36:00.432 [INFO][4138] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.93.64/26 handle="k8s-pod-network.a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:00.502364 env[1435]: 2025-05-17 00:36:00.434 [INFO][4138] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2 May 17 00:36:00.502364 env[1435]: 2025-05-17 00:36:00.443 [INFO][4138] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.93.64/26 handle="k8s-pod-network.a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:00.502364 env[1435]: 2025-05-17 00:36:00.451 [INFO][4138] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.93.67/26] block=192.168.93.64/26 handle="k8s-pod-network.a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:00.502364 env[1435]: 2025-05-17 00:36:00.451 [INFO][4138] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.93.67/26] handle="k8s-pod-network.a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:00.502364 env[1435]: 2025-05-17 00:36:00.451 [INFO][4138] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:00.502364 env[1435]: 2025-05-17 00:36:00.451 [INFO][4138] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.93.67/26] IPv6=[] ContainerID="a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2" HandleID="k8s-pod-network.a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0" May 17 00:36:00.503252 env[1435]: 2025-05-17 00:36:00.453 [INFO][4122] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2" Namespace="kube-system" Pod="coredns-674b8bbfcf-6swpt" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"633d4cfc-246e-48fa-a39a-e5371f8453be", ResourceVersion:"969", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"", Pod:"coredns-674b8bbfcf-6swpt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.93.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieb35e1ee013", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:00.503252 env[1435]: 2025-05-17 00:36:00.454 [INFO][4122] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.93.67/32] ContainerID="a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2" Namespace="kube-system" Pod="coredns-674b8bbfcf-6swpt" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0" May 17 00:36:00.503252 env[1435]: 2025-05-17 00:36:00.454 [INFO][4122] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calieb35e1ee013 ContainerID="a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2" Namespace="kube-system" Pod="coredns-674b8bbfcf-6swpt" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0" May 17 00:36:00.503252 env[1435]: 2025-05-17 00:36:00.470 [INFO][4122] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2" Namespace="kube-system" Pod="coredns-674b8bbfcf-6swpt" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0" May 17 00:36:00.503252 env[1435]: 2025-05-17 00:36:00.470 [INFO][4122] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2" Namespace="kube-system" Pod="coredns-674b8bbfcf-6swpt" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"633d4cfc-246e-48fa-a39a-e5371f8453be", ResourceVersion:"969", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2", Pod:"coredns-674b8bbfcf-6swpt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.93.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieb35e1ee013", MAC:"8a:fc:fa:0a:52:50", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:00.503252 env[1435]: 2025-05-17 00:36:00.496 [INFO][4122] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2" Namespace="kube-system" Pod="coredns-674b8bbfcf-6swpt" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0" May 17 00:36:00.549430 env[1435]: time="2025-05-17T00:36:00.548172226Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:00.549430 env[1435]: time="2025-05-17T00:36:00.548213027Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:00.549430 env[1435]: time="2025-05-17T00:36:00.548226627Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:00.549430 env[1435]: time="2025-05-17T00:36:00.548361231Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2 pid=4177 runtime=io.containerd.runc.v2 May 17 00:36:00.566000 audit[4191]: NETFILTER_CFG table=filter:111 family=2 entries=46 op=nft_register_chain pid=4191 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:00.576163 kernel: kauditd_printk_skb: 691 callbacks suppressed May 17 00:36:00.576273 kernel: audit: type=1325 audit(1747442160.566:1168): table=filter:111 family=2 entries=46 op=nft_register_chain pid=4191 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:00.588607 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali67056fa57aa: link becomes ready May 17 00:36:00.588949 systemd-networkd[1593]: cali67056fa57aa: Link UP May 17 00:36:00.589265 systemd-networkd[1593]: cali67056fa57aa: Gained carrier May 17 00:36:00.566000 audit[4191]: SYSCALL arch=c000003e syscall=46 success=yes exit=23740 a0=3 a1=7ffccad470a0 a2=0 a3=7ffccad4708c items=0 ppid=3794 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:00.617599 kernel: audit: type=1300 audit(1747442160.566:1168): arch=c000003e syscall=46 success=yes exit=23740 a0=3 a1=7ffccad470a0 a2=0 a3=7ffccad4708c items=0 ppid=3794 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:00.566000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:00.635418 kernel: audit: type=1327 audit(1747442160.566:1168): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:00.635669 env[1435]: 2025-05-17 00:36:00.391 [INFO][4133] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0 csi-node-driver- calico-system 15b079d6-0080-4890-bd00-77adf92b4b29 968 0 2025-05-17 00:35:31 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.7-n-6a88388a60 csi-node-driver-wk56l eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali67056fa57aa [] [] }} ContainerID="7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77" Namespace="calico-system" Pod="csi-node-driver-wk56l" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-" May 17 00:36:00.635669 env[1435]: 2025-05-17 00:36:00.391 [INFO][4133] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77" Namespace="calico-system" Pod="csi-node-driver-wk56l" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0" May 17 00:36:00.635669 env[1435]: 2025-05-17 00:36:00.449 [INFO][4152] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77" HandleID="k8s-pod-network.7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77" Workload="ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0" May 17 00:36:00.635669 env[1435]: 2025-05-17 00:36:00.449 [INFO][4152] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77" HandleID="k8s-pod-network.7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77" Workload="ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1020), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-6a88388a60", "pod":"csi-node-driver-wk56l", "timestamp":"2025-05-17 00:36:00.449712493 +0000 UTC"}, Hostname:"ci-3510.3.7-n-6a88388a60", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:36:00.635669 env[1435]: 2025-05-17 00:36:00.450 [INFO][4152] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:00.635669 env[1435]: 2025-05-17 00:36:00.451 [INFO][4152] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:00.635669 env[1435]: 2025-05-17 00:36:00.451 [INFO][4152] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-6a88388a60' May 17 00:36:00.635669 env[1435]: 2025-05-17 00:36:00.512 [INFO][4152] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:00.635669 env[1435]: 2025-05-17 00:36:00.521 [INFO][4152] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-6a88388a60" May 17 00:36:00.635669 env[1435]: 2025-05-17 00:36:00.530 [INFO][4152] ipam/ipam.go 511: Trying affinity for 192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:36:00.635669 env[1435]: 2025-05-17 00:36:00.533 [INFO][4152] ipam/ipam.go 158: Attempting to load block cidr=192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:36:00.635669 env[1435]: 2025-05-17 00:36:00.538 [INFO][4152] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:36:00.635669 env[1435]: 2025-05-17 00:36:00.538 [INFO][4152] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.93.64/26 handle="k8s-pod-network.7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:00.635669 env[1435]: 2025-05-17 00:36:00.540 [INFO][4152] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77 May 17 00:36:00.635669 env[1435]: 2025-05-17 00:36:00.545 [INFO][4152] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.93.64/26 handle="k8s-pod-network.7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:00.635669 env[1435]: 2025-05-17 00:36:00.556 [INFO][4152] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.93.68/26] block=192.168.93.64/26 handle="k8s-pod-network.7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:00.635669 env[1435]: 2025-05-17 00:36:00.557 [INFO][4152] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.93.68/26] handle="k8s-pod-network.7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:00.635669 env[1435]: 2025-05-17 00:36:00.557 [INFO][4152] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:00.635669 env[1435]: 2025-05-17 00:36:00.557 [INFO][4152] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.93.68/26] IPv6=[] ContainerID="7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77" HandleID="k8s-pod-network.7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77" Workload="ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0" May 17 00:36:00.636617 env[1435]: 2025-05-17 00:36:00.562 [INFO][4133] cni-plugin/k8s.go 418: Populated endpoint ContainerID="7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77" Namespace="calico-system" Pod="csi-node-driver-wk56l" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"15b079d6-0080-4890-bd00-77adf92b4b29", ResourceVersion:"968", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"", Pod:"csi-node-driver-wk56l", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.93.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali67056fa57aa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:00.636617 env[1435]: 2025-05-17 00:36:00.562 [INFO][4133] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.93.68/32] ContainerID="7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77" Namespace="calico-system" Pod="csi-node-driver-wk56l" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0" May 17 00:36:00.636617 env[1435]: 2025-05-17 00:36:00.562 [INFO][4133] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali67056fa57aa ContainerID="7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77" Namespace="calico-system" Pod="csi-node-driver-wk56l" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0" May 17 00:36:00.636617 env[1435]: 2025-05-17 00:36:00.569 [INFO][4133] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77" Namespace="calico-system" Pod="csi-node-driver-wk56l" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0" May 17 00:36:00.636617 env[1435]: 2025-05-17 00:36:00.569 [INFO][4133] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77" Namespace="calico-system" Pod="csi-node-driver-wk56l" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"15b079d6-0080-4890-bd00-77adf92b4b29", ResourceVersion:"968", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77", Pod:"csi-node-driver-wk56l", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.93.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali67056fa57aa", MAC:"56:12:c4:a7:98:4f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:00.636617 env[1435]: 2025-05-17 00:36:00.598 [INFO][4133] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77" Namespace="calico-system" Pod="csi-node-driver-wk56l" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0" May 17 00:36:00.649460 kernel: audit: type=1325 audit(1747442160.636:1169): table=filter:112 family=2 entries=44 op=nft_register_chain pid=4199 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:00.636000 audit[4199]: NETFILTER_CFG table=filter:112 family=2 entries=44 op=nft_register_chain pid=4199 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:00.636000 audit[4199]: SYSCALL arch=c000003e syscall=46 success=yes exit=21952 a0=3 a1=7ffe60b14b10 a2=0 a3=7ffe60b14afc items=0 ppid=3794 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:00.655845 systemd[1]: Started cri-containerd-a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2.scope. May 17 00:36:00.670459 kernel: audit: type=1300 audit(1747442160.636:1169): arch=c000003e syscall=46 success=yes exit=21952 a0=3 a1=7ffe60b14b10 a2=0 a3=7ffe60b14afc items=0 ppid=3794 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:00.636000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:00.683857 kernel: audit: type=1327 audit(1747442160.636:1169): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:00.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.709138 kernel: audit: type=1400 audit(1747442160.668:1170): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.709234 kernel: audit: type=1400 audit(1747442160.668:1171): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.721842 kernel: audit: type=1400 audit(1747442160.668:1172): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.739591 kernel: audit: type=1400 audit(1747442160.668:1173): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.668000 audit: BPF prog-id=170 op=LOAD May 17 00:36:00.669000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4177 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:00.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131386134363966346463366130356139343934653462393732316532 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4177 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:00.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131386134363966346463366130356139343934653462393732316532 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit: BPF prog-id=171 op=LOAD May 17 00:36:00.669000 audit[4186]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000370860 items=0 ppid=4177 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:00.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131386134363966346463366130356139343934653462393732316532 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit: BPF prog-id=172 op=LOAD May 17 00:36:00.669000 audit[4186]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003708a8 items=0 ppid=4177 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:00.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131386134363966346463366130356139343934653462393732316532 May 17 00:36:00.669000 audit: BPF prog-id=172 op=UNLOAD May 17 00:36:00.669000 audit: BPF prog-id=171 op=UNLOAD May 17 00:36:00.669000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.669000 audit: BPF prog-id=173 op=LOAD May 17 00:36:00.669000 audit[4186]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000370cb8 items=0 ppid=4177 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:00.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131386134363966346463366130356139343934653462393732316532 May 17 00:36:00.755526 env[1435]: time="2025-05-17T00:36:00.755473249Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-6swpt,Uid:633d4cfc-246e-48fa-a39a-e5371f8453be,Namespace:kube-system,Attempt:1,} returns sandbox id \"a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2\"" May 17 00:36:00.894160 env[1435]: time="2025-05-17T00:36:00.894102475Z" level=info msg="CreateContainer within sandbox \"a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:36:00.920564 env[1435]: time="2025-05-17T00:36:00.917480152Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:00.920564 env[1435]: time="2025-05-17T00:36:00.917530854Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:00.920564 env[1435]: time="2025-05-17T00:36:00.917548554Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:00.920564 env[1435]: time="2025-05-17T00:36:00.917724658Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77 pid=4225 runtime=io.containerd.runc.v2 May 17 00:36:00.948764 systemd[1]: Started cri-containerd-7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77.scope. May 17 00:36:00.966303 env[1435]: time="2025-05-17T00:36:00.966211157Z" level=info msg="CreateContainer within sandbox \"a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b4d585a1ab941161a547d960cde0dab7f47261797e48d0d02b8c007dc14db083\"" May 17 00:36:00.967282 env[1435]: time="2025-05-17T00:36:00.967076678Z" level=info msg="StartContainer for \"b4d585a1ab941161a547d960cde0dab7f47261797e48d0d02b8c007dc14db083\"" May 17 00:36:00.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.967000 audit: BPF prog-id=174 op=LOAD May 17 00:36:00.968000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.968000 audit[4239]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4225 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:00.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766643330663739323937356531306433653031306165616436373864 May 17 00:36:00.968000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.968000 audit[4239]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4225 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:00.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766643330663739323937356531306433653031306165616436373864 May 17 00:36:00.968000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.968000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.968000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.968000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.968000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.968000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.968000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.968000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.968000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.968000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.968000 audit: BPF prog-id=175 op=LOAD May 17 00:36:00.968000 audit[4239]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00033c9c0 items=0 ppid=4225 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:00.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766643330663739323937356531306433653031306165616436373864 May 17 00:36:00.969000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.969000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.969000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.969000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.969000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.969000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.969000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.969000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.969000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.969000 audit: BPF prog-id=176 op=LOAD May 17 00:36:00.969000 audit[4239]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00033ca08 items=0 ppid=4225 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:00.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766643330663739323937356531306433653031306165616436373864 May 17 00:36:00.969000 audit: BPF prog-id=176 op=UNLOAD May 17 00:36:00.969000 audit: BPF prog-id=175 op=UNLOAD May 17 00:36:00.969000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.969000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.969000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.969000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.969000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.969000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.969000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.969000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.969000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.969000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:00.969000 audit: BPF prog-id=177 op=LOAD May 17 00:36:00.969000 audit[4239]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00033ce18 items=0 ppid=4225 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:00.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766643330663739323937356531306433653031306165616436373864 May 17 00:36:00.981892 env[1435]: time="2025-05-17T00:36:00.981857243Z" level=info msg="StopPodSandbox for \"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\"" May 17 00:36:01.000735 env[1435]: time="2025-05-17T00:36:01.000696809Z" level=info msg="StopPodSandbox for \"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\"" May 17 00:36:01.012220 systemd[1]: Started cri-containerd-b4d585a1ab941161a547d960cde0dab7f47261797e48d0d02b8c007dc14db083.scope. May 17 00:36:01.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.034000 audit: BPF prog-id=178 op=LOAD May 17 00:36:01.035000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.035000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4177 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234643538356131616239343131363161353437643936306364653064 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4177 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234643538356131616239343131363161353437643936306364653064 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit: BPF prog-id=179 op=LOAD May 17 00:36:01.036000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000334c20 items=0 ppid=4177 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234643538356131616239343131363161353437643936306364653064 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit: BPF prog-id=180 op=LOAD May 17 00:36:01.036000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000334c68 items=0 ppid=4177 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234643538356131616239343131363161353437643936306364653064 May 17 00:36:01.036000 audit: BPF prog-id=180 op=UNLOAD May 17 00:36:01.036000 audit: BPF prog-id=179 op=UNLOAD May 17 00:36:01.036000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.036000 audit: BPF prog-id=181 op=LOAD May 17 00:36:01.036000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000335078 items=0 ppid=4177 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234643538356131616239343131363161353437643936306364653064 May 17 00:36:01.072756 env[1435]: time="2025-05-17T00:36:01.072708354Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wk56l,Uid:15b079d6-0080-4890-bd00-77adf92b4b29,Namespace:calico-system,Attempt:1,} returns sandbox id \"7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77\"" May 17 00:36:01.093737 env[1435]: time="2025-05-17T00:36:01.093677362Z" level=info msg="StartContainer for \"b4d585a1ab941161a547d960cde0dab7f47261797e48d0d02b8c007dc14db083\" returns successfully" May 17 00:36:01.128000 audit[4297]: AVC avc: denied { getattr } for pid=4297 comm="coredns" path="cgroup:[4026532682]" dev="nsfs" ino=4026532682 scontext=system_u:system_r:svirt_lxc_net_t:s0:c718,c879 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:36:01.128000 audit[4297]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a810 a2=c0004a1558 a3=0 items=0 ppid=4177 pid=4297 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c718,c879 key=(null) May 17 00:36:01.128000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:36:01.247590 env[1435]: 2025-05-17 00:36:01.123 [INFO][4304] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" May 17 00:36:01.247590 env[1435]: 2025-05-17 00:36:01.123 [INFO][4304] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" iface="eth0" netns="/var/run/netns/cni-52e16b1d-f0ca-94c0-bc3c-0f9eef435f2e" May 17 00:36:01.247590 env[1435]: 2025-05-17 00:36:01.123 [INFO][4304] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" iface="eth0" netns="/var/run/netns/cni-52e16b1d-f0ca-94c0-bc3c-0f9eef435f2e" May 17 00:36:01.247590 env[1435]: 2025-05-17 00:36:01.123 [INFO][4304] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" iface="eth0" netns="/var/run/netns/cni-52e16b1d-f0ca-94c0-bc3c-0f9eef435f2e" May 17 00:36:01.247590 env[1435]: 2025-05-17 00:36:01.123 [INFO][4304] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" May 17 00:36:01.247590 env[1435]: 2025-05-17 00:36:01.123 [INFO][4304] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" May 17 00:36:01.247590 env[1435]: 2025-05-17 00:36:01.196 [INFO][4327] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" HandleID="k8s-pod-network.7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0" May 17 00:36:01.247590 env[1435]: 2025-05-17 00:36:01.199 [INFO][4327] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:01.247590 env[1435]: 2025-05-17 00:36:01.200 [INFO][4327] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:01.247590 env[1435]: 2025-05-17 00:36:01.226 [WARNING][4327] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" HandleID="k8s-pod-network.7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0" May 17 00:36:01.247590 env[1435]: 2025-05-17 00:36:01.226 [INFO][4327] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" HandleID="k8s-pod-network.7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0" May 17 00:36:01.247590 env[1435]: 2025-05-17 00:36:01.234 [INFO][4327] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:01.247590 env[1435]: 2025-05-17 00:36:01.236 [INFO][4304] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" May 17 00:36:01.257933 systemd[1]: run-netns-cni\x2d52e16b1d\x2df0ca\x2d94c0\x2dbc3c\x2d0f9eef435f2e.mount: Deactivated successfully. May 17 00:36:01.259755 env[1435]: time="2025-05-17T00:36:01.259702886Z" level=info msg="TearDown network for sandbox \"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\" successfully" May 17 00:36:01.259755 env[1435]: time="2025-05-17T00:36:01.259746587Z" level=info msg="StopPodSandbox for \"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\" returns successfully" May 17 00:36:01.264787 env[1435]: time="2025-05-17T00:36:01.264752208Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-ggpwh,Uid:238f3626-0d31-4ca4-950c-dfe985793111,Namespace:kube-system,Attempt:1,}" May 17 00:36:01.273000 audit[4345]: NETFILTER_CFG table=filter:113 family=2 entries=20 op=nft_register_rule pid=4345 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:01.273000 audit[4345]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe75eca0b0 a2=0 a3=7ffe75eca09c items=0 ppid=2559 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.273000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:01.285000 audit[4345]: NETFILTER_CFG table=nat:114 family=2 entries=14 op=nft_register_rule pid=4345 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:01.285000 audit[4345]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe75eca0b0 a2=0 a3=0 items=0 ppid=2559 pid=4345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.285000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:01.290103 env[1435]: 2025-05-17 00:36:01.197 [INFO][4313] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" May 17 00:36:01.290103 env[1435]: 2025-05-17 00:36:01.197 [INFO][4313] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" iface="eth0" netns="/var/run/netns/cni-2b65fbdd-d0c4-f194-38de-be2a26f03b1f" May 17 00:36:01.290103 env[1435]: 2025-05-17 00:36:01.198 [INFO][4313] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" iface="eth0" netns="/var/run/netns/cni-2b65fbdd-d0c4-f194-38de-be2a26f03b1f" May 17 00:36:01.290103 env[1435]: 2025-05-17 00:36:01.198 [INFO][4313] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" iface="eth0" netns="/var/run/netns/cni-2b65fbdd-d0c4-f194-38de-be2a26f03b1f" May 17 00:36:01.290103 env[1435]: 2025-05-17 00:36:01.198 [INFO][4313] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" May 17 00:36:01.290103 env[1435]: 2025-05-17 00:36:01.198 [INFO][4313] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" May 17 00:36:01.290103 env[1435]: 2025-05-17 00:36:01.277 [INFO][4339] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" HandleID="k8s-pod-network.51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0" May 17 00:36:01.290103 env[1435]: 2025-05-17 00:36:01.278 [INFO][4339] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:01.290103 env[1435]: 2025-05-17 00:36:01.278 [INFO][4339] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:01.290103 env[1435]: 2025-05-17 00:36:01.285 [WARNING][4339] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" HandleID="k8s-pod-network.51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0" May 17 00:36:01.290103 env[1435]: 2025-05-17 00:36:01.285 [INFO][4339] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" HandleID="k8s-pod-network.51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0" May 17 00:36:01.290103 env[1435]: 2025-05-17 00:36:01.286 [INFO][4339] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:01.290103 env[1435]: 2025-05-17 00:36:01.288 [INFO][4313] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" May 17 00:36:01.295713 systemd[1]: run-netns-cni\x2d2b65fbdd\x2dd0c4\x2df194\x2d38de\x2dbe2a26f03b1f.mount: Deactivated successfully. May 17 00:36:01.301145 env[1435]: time="2025-05-17T00:36:01.301103689Z" level=info msg="TearDown network for sandbox \"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\" successfully" May 17 00:36:01.301276 env[1435]: time="2025-05-17T00:36:01.301255693Z" level=info msg="StopPodSandbox for \"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\" returns successfully" May 17 00:36:01.304508 env[1435]: time="2025-05-17T00:36:01.304476771Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5f47758c9f-l26k9,Uid:1c2b527d-d98b-4db0-86b0-f54b67fb605f,Namespace:calico-system,Attempt:1,}" May 17 00:36:01.549125 systemd-networkd[1593]: cali1f4abdcc7aa: Link UP May 17 00:36:01.559373 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:36:01.559504 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1f4abdcc7aa: link becomes ready May 17 00:36:01.561989 systemd-networkd[1593]: cali1f4abdcc7aa: Gained carrier May 17 00:36:01.582747 kubelet[2423]: I0517 00:36:01.582184 2423 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-6swpt" podStartSLOduration=42.5821588 podStartE2EDuration="42.5821588s" podCreationTimestamp="2025-05-17 00:35:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:36:01.241617247 +0000 UTC m=+47.392648822" watchObservedRunningTime="2025-05-17 00:36:01.5821588 +0000 UTC m=+47.733190375" May 17 00:36:01.585575 env[1435]: 2025-05-17 00:36:01.392 [INFO][4348] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0 coredns-674b8bbfcf- kube-system 238f3626-0d31-4ca4-950c-dfe985793111 983 0 2025-05-17 00:35:19 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-6a88388a60 coredns-674b8bbfcf-ggpwh eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali1f4abdcc7aa [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35" Namespace="kube-system" Pod="coredns-674b8bbfcf-ggpwh" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-" May 17 00:36:01.585575 env[1435]: 2025-05-17 00:36:01.392 [INFO][4348] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35" Namespace="kube-system" Pod="coredns-674b8bbfcf-ggpwh" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0" May 17 00:36:01.585575 env[1435]: 2025-05-17 00:36:01.503 [INFO][4369] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35" HandleID="k8s-pod-network.442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0" May 17 00:36:01.585575 env[1435]: 2025-05-17 00:36:01.504 [INFO][4369] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35" HandleID="k8s-pod-network.442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003a8520), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-6a88388a60", "pod":"coredns-674b8bbfcf-ggpwh", "timestamp":"2025-05-17 00:36:01.503986105 +0000 UTC"}, Hostname:"ci-3510.3.7-n-6a88388a60", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:36:01.585575 env[1435]: 2025-05-17 00:36:01.505 [INFO][4369] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:01.585575 env[1435]: 2025-05-17 00:36:01.505 [INFO][4369] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:01.585575 env[1435]: 2025-05-17 00:36:01.505 [INFO][4369] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-6a88388a60' May 17 00:36:01.585575 env[1435]: 2025-05-17 00:36:01.513 [INFO][4369] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:01.585575 env[1435]: 2025-05-17 00:36:01.519 [INFO][4369] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-6a88388a60" May 17 00:36:01.585575 env[1435]: 2025-05-17 00:36:01.523 [INFO][4369] ipam/ipam.go 511: Trying affinity for 192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:36:01.585575 env[1435]: 2025-05-17 00:36:01.525 [INFO][4369] ipam/ipam.go 158: Attempting to load block cidr=192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:36:01.585575 env[1435]: 2025-05-17 00:36:01.527 [INFO][4369] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:36:01.585575 env[1435]: 2025-05-17 00:36:01.527 [INFO][4369] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.93.64/26 handle="k8s-pod-network.442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:01.585575 env[1435]: 2025-05-17 00:36:01.528 [INFO][4369] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35 May 17 00:36:01.585575 env[1435]: 2025-05-17 00:36:01.532 [INFO][4369] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.93.64/26 handle="k8s-pod-network.442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:01.585575 env[1435]: 2025-05-17 00:36:01.542 [INFO][4369] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.93.69/26] block=192.168.93.64/26 handle="k8s-pod-network.442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:01.585575 env[1435]: 2025-05-17 00:36:01.542 [INFO][4369] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.93.69/26] handle="k8s-pod-network.442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:01.585575 env[1435]: 2025-05-17 00:36:01.542 [INFO][4369] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:01.585575 env[1435]: 2025-05-17 00:36:01.542 [INFO][4369] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.93.69/26] IPv6=[] ContainerID="442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35" HandleID="k8s-pod-network.442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0" May 17 00:36:01.586517 env[1435]: 2025-05-17 00:36:01.545 [INFO][4348] cni-plugin/k8s.go 418: Populated endpoint ContainerID="442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35" Namespace="kube-system" Pod="coredns-674b8bbfcf-ggpwh" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"238f3626-0d31-4ca4-950c-dfe985793111", ResourceVersion:"983", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"", Pod:"coredns-674b8bbfcf-ggpwh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.93.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1f4abdcc7aa", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:01.586517 env[1435]: 2025-05-17 00:36:01.545 [INFO][4348] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.93.69/32] ContainerID="442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35" Namespace="kube-system" Pod="coredns-674b8bbfcf-ggpwh" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0" May 17 00:36:01.586517 env[1435]: 2025-05-17 00:36:01.545 [INFO][4348] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1f4abdcc7aa ContainerID="442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35" Namespace="kube-system" Pod="coredns-674b8bbfcf-ggpwh" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0" May 17 00:36:01.586517 env[1435]: 2025-05-17 00:36:01.564 [INFO][4348] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35" Namespace="kube-system" Pod="coredns-674b8bbfcf-ggpwh" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0" May 17 00:36:01.586517 env[1435]: 2025-05-17 00:36:01.564 [INFO][4348] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35" Namespace="kube-system" Pod="coredns-674b8bbfcf-ggpwh" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"238f3626-0d31-4ca4-950c-dfe985793111", ResourceVersion:"983", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35", Pod:"coredns-674b8bbfcf-ggpwh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.93.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1f4abdcc7aa", MAC:"96:c5:60:9d:3c:eb", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:01.586517 env[1435]: 2025-05-17 00:36:01.578 [INFO][4348] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35" Namespace="kube-system" Pod="coredns-674b8bbfcf-ggpwh" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0" May 17 00:36:01.604000 audit[4397]: NETFILTER_CFG table=filter:115 family=2 entries=44 op=nft_register_chain pid=4397 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:01.604000 audit[4397]: SYSCALL arch=c000003e syscall=46 success=yes exit=21532 a0=3 a1=7ffc575394a0 a2=0 a3=7ffc5753948c items=0 ppid=3794 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.604000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:01.638476 env[1435]: time="2025-05-17T00:36:01.638408163Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:01.638684 env[1435]: time="2025-05-17T00:36:01.638660269Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:01.638793 env[1435]: time="2025-05-17T00:36:01.638770972Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:01.639003 env[1435]: time="2025-05-17T00:36:01.638974876Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35 pid=4405 runtime=io.containerd.runc.v2 May 17 00:36:01.665575 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicea31a03268: link becomes ready May 17 00:36:01.669359 systemd-networkd[1593]: calicea31a03268: Link UP May 17 00:36:01.670235 systemd-networkd[1593]: calicea31a03268: Gained carrier May 17 00:36:01.689577 env[1435]: 2025-05-17 00:36:01.443 [INFO][4359] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0 calico-kube-controllers-5f47758c9f- calico-system 1c2b527d-d98b-4db0-86b0-f54b67fb605f 984 0 2025-05-17 00:35:31 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5f47758c9f projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.7-n-6a88388a60 calico-kube-controllers-5f47758c9f-l26k9 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calicea31a03268 [] [] }} ContainerID="7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938" Namespace="calico-system" Pod="calico-kube-controllers-5f47758c9f-l26k9" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-" May 17 00:36:01.689577 env[1435]: 2025-05-17 00:36:01.443 [INFO][4359] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938" Namespace="calico-system" Pod="calico-kube-controllers-5f47758c9f-l26k9" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0" May 17 00:36:01.689577 env[1435]: 2025-05-17 00:36:01.528 [INFO][4378] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938" HandleID="k8s-pod-network.7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0" May 17 00:36:01.689577 env[1435]: 2025-05-17 00:36:01.529 [INFO][4378] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938" HandleID="k8s-pod-network.7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e3020), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-6a88388a60", "pod":"calico-kube-controllers-5f47758c9f-l26k9", "timestamp":"2025-05-17 00:36:01.528174591 +0000 UTC"}, Hostname:"ci-3510.3.7-n-6a88388a60", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:36:01.689577 env[1435]: 2025-05-17 00:36:01.530 [INFO][4378] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:01.689577 env[1435]: 2025-05-17 00:36:01.545 [INFO][4378] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:01.689577 env[1435]: 2025-05-17 00:36:01.545 [INFO][4378] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-6a88388a60' May 17 00:36:01.689577 env[1435]: 2025-05-17 00:36:01.614 [INFO][4378] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:01.689577 env[1435]: 2025-05-17 00:36:01.620 [INFO][4378] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-6a88388a60" May 17 00:36:01.689577 env[1435]: 2025-05-17 00:36:01.626 [INFO][4378] ipam/ipam.go 511: Trying affinity for 192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:36:01.689577 env[1435]: 2025-05-17 00:36:01.628 [INFO][4378] ipam/ipam.go 158: Attempting to load block cidr=192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:36:01.689577 env[1435]: 2025-05-17 00:36:01.631 [INFO][4378] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:36:01.689577 env[1435]: 2025-05-17 00:36:01.631 [INFO][4378] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.93.64/26 handle="k8s-pod-network.7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:01.689577 env[1435]: 2025-05-17 00:36:01.635 [INFO][4378] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938 May 17 00:36:01.689577 env[1435]: 2025-05-17 00:36:01.641 [INFO][4378] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.93.64/26 handle="k8s-pod-network.7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:01.689577 env[1435]: 2025-05-17 00:36:01.653 [INFO][4378] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.93.70/26] block=192.168.93.64/26 handle="k8s-pod-network.7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:01.689577 env[1435]: 2025-05-17 00:36:01.653 [INFO][4378] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.93.70/26] handle="k8s-pod-network.7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:01.689577 env[1435]: 2025-05-17 00:36:01.653 [INFO][4378] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:01.689577 env[1435]: 2025-05-17 00:36:01.653 [INFO][4378] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.93.70/26] IPv6=[] ContainerID="7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938" HandleID="k8s-pod-network.7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0" May 17 00:36:01.690535 env[1435]: 2025-05-17 00:36:01.655 [INFO][4359] cni-plugin/k8s.go 418: Populated endpoint ContainerID="7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938" Namespace="calico-system" Pod="calico-kube-controllers-5f47758c9f-l26k9" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0", GenerateName:"calico-kube-controllers-5f47758c9f-", Namespace:"calico-system", SelfLink:"", UID:"1c2b527d-d98b-4db0-86b0-f54b67fb605f", ResourceVersion:"984", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5f47758c9f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"", Pod:"calico-kube-controllers-5f47758c9f-l26k9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.93.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicea31a03268", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:01.690535 env[1435]: 2025-05-17 00:36:01.655 [INFO][4359] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.93.70/32] ContainerID="7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938" Namespace="calico-system" Pod="calico-kube-controllers-5f47758c9f-l26k9" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0" May 17 00:36:01.690535 env[1435]: 2025-05-17 00:36:01.655 [INFO][4359] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicea31a03268 ContainerID="7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938" Namespace="calico-system" Pod="calico-kube-controllers-5f47758c9f-l26k9" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0" May 17 00:36:01.690535 env[1435]: 2025-05-17 00:36:01.665 [INFO][4359] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938" Namespace="calico-system" Pod="calico-kube-controllers-5f47758c9f-l26k9" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0" May 17 00:36:01.690535 env[1435]: 2025-05-17 00:36:01.666 [INFO][4359] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938" Namespace="calico-system" Pod="calico-kube-controllers-5f47758c9f-l26k9" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0", GenerateName:"calico-kube-controllers-5f47758c9f-", Namespace:"calico-system", SelfLink:"", UID:"1c2b527d-d98b-4db0-86b0-f54b67fb605f", ResourceVersion:"984", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5f47758c9f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938", Pod:"calico-kube-controllers-5f47758c9f-l26k9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.93.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicea31a03268", MAC:"b2:e0:bd:41:2e:23", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:01.690535 env[1435]: 2025-05-17 00:36:01.684 [INFO][4359] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938" Namespace="calico-system" Pod="calico-kube-controllers-5f47758c9f-l26k9" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0" May 17 00:36:01.706353 systemd[1]: Started cri-containerd-442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35.scope. May 17 00:36:01.738593 env[1435]: time="2025-05-17T00:36:01.738090778Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:01.738593 env[1435]: time="2025-05-17T00:36:01.738157780Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:01.738593 env[1435]: time="2025-05-17T00:36:01.738188981Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:01.738593 env[1435]: time="2025-05-17T00:36:01.738338784Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938 pid=4443 runtime=io.containerd.runc.v2 May 17 00:36:01.756000 audit[4441]: NETFILTER_CFG table=filter:116 family=2 entries=52 op=nft_register_chain pid=4441 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:01.756000 audit[4441]: SYSCALL arch=c000003e syscall=46 success=yes exit=24328 a0=3 a1=7fffa1db3cc0 a2=0 a3=7fffa1db3cac items=0 ppid=3794 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.756000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:01.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.762000 audit: BPF prog-id=182 op=LOAD May 17 00:36:01.763000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.763000 audit[4415]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4405 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434326539336365343939666463613233333332376364343030323164 May 17 00:36:01.763000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.763000 audit[4415]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4405 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434326539336365343939666463613233333332376364343030323164 May 17 00:36:01.763000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.763000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.763000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.763000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.763000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.763000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.763000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.763000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.763000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.763000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.763000 audit: BPF prog-id=183 op=LOAD May 17 00:36:01.763000 audit[4415]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002c3b20 items=0 ppid=4405 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434326539336365343939666463613233333332376364343030323164 May 17 00:36:01.764000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.764000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.764000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.764000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.764000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.764000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.764000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.764000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.764000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.764000 audit: BPF prog-id=184 op=LOAD May 17 00:36:01.764000 audit[4415]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002c3b68 items=0 ppid=4405 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434326539336365343939666463613233333332376364343030323164 May 17 00:36:01.765000 audit: BPF prog-id=184 op=UNLOAD May 17 00:36:01.765000 audit: BPF prog-id=183 op=UNLOAD May 17 00:36:01.765000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.765000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.765000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.765000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.765000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.765000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.765000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.765000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.765000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.765000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.765000 audit: BPF prog-id=185 op=LOAD May 17 00:36:01.765000 audit[4415]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002c3f78 items=0 ppid=4405 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434326539336365343939666463613233333332376364343030323164 May 17 00:36:01.790348 systemd[1]: Started cri-containerd-7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938.scope. May 17 00:36:01.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.830000 audit: BPF prog-id=186 op=LOAD May 17 00:36:01.839000 audit[4455]: AVC avc: denied { bpf } for pid=4455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4443 pid=4455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765373831396539356339323261616437353631303532626163623963 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { perfmon } for pid=4455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4443 pid=4455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765373831396539356339323261616437353631303532626163623963 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { bpf } for pid=4455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { bpf } for pid=4455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { bpf } for pid=4455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { perfmon } for pid=4455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { perfmon } for pid=4455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { perfmon } for pid=4455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { perfmon } for pid=4455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { perfmon } for pid=4455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { bpf } for pid=4455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { bpf } for pid=4455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit: BPF prog-id=187 op=LOAD May 17 00:36:01.839000 audit[4455]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025050 items=0 ppid=4443 pid=4455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765373831396539356339323261616437353631303532626163623963 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { bpf } for pid=4455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { bpf } for pid=4455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { perfmon } for pid=4455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { perfmon } for pid=4455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { perfmon } for pid=4455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { perfmon } for pid=4455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { perfmon } for pid=4455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { bpf } for pid=4455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { bpf } for pid=4455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit: BPF prog-id=188 op=LOAD May 17 00:36:01.839000 audit[4455]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025098 items=0 ppid=4443 pid=4455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765373831396539356339323261616437353631303532626163623963 May 17 00:36:01.839000 audit: BPF prog-id=188 op=UNLOAD May 17 00:36:01.839000 audit: BPF prog-id=187 op=UNLOAD May 17 00:36:01.839000 audit[4455]: AVC avc: denied { bpf } for pid=4455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { bpf } for pid=4455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { bpf } for pid=4455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { perfmon } for pid=4455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { perfmon } for pid=4455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { perfmon } for pid=4455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { perfmon } for pid=4455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { perfmon } for pid=4455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { bpf } for pid=4455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit[4455]: AVC avc: denied { bpf } for pid=4455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.839000 audit: BPF prog-id=189 op=LOAD May 17 00:36:01.839000 audit[4455]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000254a8 items=0 ppid=4443 pid=4455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765373831396539356339323261616437353631303532626163623963 May 17 00:36:01.844928 env[1435]: time="2025-05-17T00:36:01.844883366Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-ggpwh,Uid:238f3626-0d31-4ca4-950c-dfe985793111,Namespace:kube-system,Attempt:1,} returns sandbox id \"442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35\"" May 17 00:36:01.855177 env[1435]: time="2025-05-17T00:36:01.855139015Z" level=info msg="CreateContainer within sandbox \"442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:36:01.896558 env[1435]: time="2025-05-17T00:36:01.895592695Z" level=info msg="CreateContainer within sandbox \"442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d0b2b9849238e2658b1facd3cab8ed6ed12acfd9362804672184dbcc47be48a7\"" May 17 00:36:01.897769 env[1435]: time="2025-05-17T00:36:01.897728947Z" level=info msg="StartContainer for \"d0b2b9849238e2658b1facd3cab8ed6ed12acfd9362804672184dbcc47be48a7\"" May 17 00:36:01.904507 env[1435]: time="2025-05-17T00:36:01.904374908Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5f47758c9f-l26k9,Uid:1c2b527d-d98b-4db0-86b0-f54b67fb605f,Namespace:calico-system,Attempt:1,} returns sandbox id \"7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938\"" May 17 00:36:01.945103 systemd[1]: Started cri-containerd-d0b2b9849238e2658b1facd3cab8ed6ed12acfd9362804672184dbcc47be48a7.scope. May 17 00:36:01.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.967000 audit: BPF prog-id=190 op=LOAD May 17 00:36:01.968000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4405 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430623262393834393233386532363538623166616364336361623865 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4405 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430623262393834393233386532363538623166616364336361623865 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit: BPF prog-id=191 op=LOAD May 17 00:36:01.968000 audit[4496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003a8fe0 items=0 ppid=4405 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430623262393834393233386532363538623166616364336361623865 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit: BPF prog-id=192 op=LOAD May 17 00:36:01.968000 audit[4496]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003a9028 items=0 ppid=4405 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430623262393834393233386532363538623166616364336361623865 May 17 00:36:01.968000 audit: BPF prog-id=192 op=UNLOAD May 17 00:36:01.968000 audit: BPF prog-id=191 op=UNLOAD May 17 00:36:01.968000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { perfmon } for pid=4496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit[4496]: AVC avc: denied { bpf } for pid=4496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:01.968000 audit: BPF prog-id=193 op=LOAD May 17 00:36:01.968000 audit[4496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003a9438 items=0 ppid=4405 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:01.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430623262393834393233386532363538623166616364336361623865 May 17 00:36:01.979435 env[1435]: time="2025-05-17T00:36:01.979381526Z" level=info msg="StopPodSandbox for \"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\"" May 17 00:36:01.990370 env[1435]: time="2025-05-17T00:36:01.990328591Z" level=info msg="StopPodSandbox for \"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\"" May 17 00:36:02.060617 systemd-networkd[1593]: cali67056fa57aa: Gained IPv6LL May 17 00:36:02.066798 env[1435]: time="2025-05-17T00:36:02.066744012Z" level=info msg="StartContainer for \"d0b2b9849238e2658b1facd3cab8ed6ed12acfd9362804672184dbcc47be48a7\" returns successfully" May 17 00:36:02.076000 audit[4509]: AVC avc: denied { getattr } for pid=4509 comm="coredns" path="cgroup:[4026532697]" dev="nsfs" ino=4026532697 scontext=system_u:system_r:svirt_lxc_net_t:s0:c188,c521 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:36:02.076000 audit[4509]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00014c960 a2=c00043fe48 a3=0 items=0 ppid=4405 pid=4509 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c188,c521 key=(null) May 17 00:36:02.076000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:36:02.221692 env[1435]: 2025-05-17 00:36:02.112 [INFO][4530] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" May 17 00:36:02.221692 env[1435]: 2025-05-17 00:36:02.112 [INFO][4530] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" iface="eth0" netns="/var/run/netns/cni-6c364b2f-d560-058f-c166-3725b4d6b4b2" May 17 00:36:02.221692 env[1435]: 2025-05-17 00:36:02.112 [INFO][4530] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" iface="eth0" netns="/var/run/netns/cni-6c364b2f-d560-058f-c166-3725b4d6b4b2" May 17 00:36:02.221692 env[1435]: 2025-05-17 00:36:02.112 [INFO][4530] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" iface="eth0" netns="/var/run/netns/cni-6c364b2f-d560-058f-c166-3725b4d6b4b2" May 17 00:36:02.221692 env[1435]: 2025-05-17 00:36:02.112 [INFO][4530] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" May 17 00:36:02.221692 env[1435]: 2025-05-17 00:36:02.112 [INFO][4530] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" May 17 00:36:02.221692 env[1435]: 2025-05-17 00:36:02.206 [INFO][4555] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" HandleID="k8s-pod-network.80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0" May 17 00:36:02.221692 env[1435]: 2025-05-17 00:36:02.206 [INFO][4555] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:02.221692 env[1435]: 2025-05-17 00:36:02.206 [INFO][4555] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:02.221692 env[1435]: 2025-05-17 00:36:02.216 [WARNING][4555] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" HandleID="k8s-pod-network.80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0" May 17 00:36:02.221692 env[1435]: 2025-05-17 00:36:02.216 [INFO][4555] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" HandleID="k8s-pod-network.80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0" May 17 00:36:02.221692 env[1435]: 2025-05-17 00:36:02.218 [INFO][4555] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:02.221692 env[1435]: 2025-05-17 00:36:02.220 [INFO][4530] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" May 17 00:36:02.226171 systemd[1]: run-netns-cni\x2d6c364b2f\x2dd560\x2d058f\x2dc166\x2d3725b4d6b4b2.mount: Deactivated successfully. May 17 00:36:02.237634 env[1435]: time="2025-05-17T00:36:02.237586073Z" level=info msg="TearDown network for sandbox \"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\" successfully" May 17 00:36:02.237788 env[1435]: time="2025-05-17T00:36:02.237764977Z" level=info msg="StopPodSandbox for \"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\" returns successfully" May 17 00:36:02.239977 env[1435]: time="2025-05-17T00:36:02.239334314Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7664dbdf7c-5265z,Uid:245c2865-77c9-4af3-afa1-058bc899e239,Namespace:calico-apiserver,Attempt:1,}" May 17 00:36:02.273340 kubelet[2423]: I0517 00:36:02.273024 2423 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-ggpwh" podStartSLOduration=43.273003315 podStartE2EDuration="43.273003315s" podCreationTimestamp="2025-05-17 00:35:19 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:36:02.272283898 +0000 UTC m=+48.423315573" watchObservedRunningTime="2025-05-17 00:36:02.273003315 +0000 UTC m=+48.424034890" May 17 00:36:02.296000 audit[4572]: NETFILTER_CFG table=filter:117 family=2 entries=20 op=nft_register_rule pid=4572 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:02.296000 audit[4572]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff9e1b7c00 a2=0 a3=7fff9e1b7bec items=0 ppid=2559 pid=4572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:02.296000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:02.317788 systemd-networkd[1593]: calieb35e1ee013: Gained IPv6LL May 17 00:36:02.325000 audit[4572]: NETFILTER_CFG table=nat:118 family=2 entries=14 op=nft_register_rule pid=4572 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:02.345656 env[1435]: 2025-05-17 00:36:02.201 [INFO][4547] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" May 17 00:36:02.345656 env[1435]: 2025-05-17 00:36:02.201 [INFO][4547] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" iface="eth0" netns="/var/run/netns/cni-47bb3d08-6be2-cd7c-055f-d55847a3355c" May 17 00:36:02.345656 env[1435]: 2025-05-17 00:36:02.201 [INFO][4547] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" iface="eth0" netns="/var/run/netns/cni-47bb3d08-6be2-cd7c-055f-d55847a3355c" May 17 00:36:02.345656 env[1435]: 2025-05-17 00:36:02.201 [INFO][4547] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" iface="eth0" netns="/var/run/netns/cni-47bb3d08-6be2-cd7c-055f-d55847a3355c" May 17 00:36:02.345656 env[1435]: 2025-05-17 00:36:02.201 [INFO][4547] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" May 17 00:36:02.345656 env[1435]: 2025-05-17 00:36:02.202 [INFO][4547] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" May 17 00:36:02.345656 env[1435]: 2025-05-17 00:36:02.294 [INFO][4566] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" HandleID="k8s-pod-network.57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" Workload="ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0" May 17 00:36:02.345656 env[1435]: 2025-05-17 00:36:02.294 [INFO][4566] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:02.345656 env[1435]: 2025-05-17 00:36:02.294 [INFO][4566] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:02.345656 env[1435]: 2025-05-17 00:36:02.321 [WARNING][4566] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" HandleID="k8s-pod-network.57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" Workload="ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0" May 17 00:36:02.345656 env[1435]: 2025-05-17 00:36:02.321 [INFO][4566] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" HandleID="k8s-pod-network.57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" Workload="ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0" May 17 00:36:02.345656 env[1435]: 2025-05-17 00:36:02.339 [INFO][4566] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:02.345656 env[1435]: 2025-05-17 00:36:02.341 [INFO][4547] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" May 17 00:36:02.350019 systemd[1]: run-netns-cni\x2d47bb3d08\x2d6be2\x2dcd7c\x2d055f\x2dd55847a3355c.mount: Deactivated successfully. May 17 00:36:02.351840 env[1435]: time="2025-05-17T00:36:02.350118348Z" level=info msg="TearDown network for sandbox \"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\" successfully" May 17 00:36:02.351840 env[1435]: time="2025-05-17T00:36:02.350162149Z" level=info msg="StopPodSandbox for \"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\" returns successfully" May 17 00:36:02.351840 env[1435]: time="2025-05-17T00:36:02.350875166Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-ktd8c,Uid:90fc490d-b68e-41e0-a777-9015e6ba2a3c,Namespace:calico-system,Attempt:1,}" May 17 00:36:02.325000 audit[4572]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff9e1b7c00 a2=0 a3=0 items=0 ppid=2559 pid=4572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:02.325000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:02.420000 audit[4587]: NETFILTER_CFG table=filter:119 family=2 entries=17 op=nft_register_rule pid=4587 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:02.420000 audit[4587]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd56e0e750 a2=0 a3=7ffd56e0e73c items=0 ppid=2559 pid=4587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:02.420000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:02.433000 audit[4587]: NETFILTER_CFG table=nat:120 family=2 entries=47 op=nft_register_chain pid=4587 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:02.433000 audit[4587]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd56e0e750 a2=0 a3=7ffd56e0e73c items=0 ppid=2559 pid=4587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:02.433000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:02.588459 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:36:02.588661 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0ce7dba7936: link becomes ready May 17 00:36:02.577179 systemd-networkd[1593]: cali0ce7dba7936: Link UP May 17 00:36:02.593997 systemd-networkd[1593]: cali0ce7dba7936: Gained carrier May 17 00:36:02.615238 env[1435]: 2025-05-17 00:36:02.416 [INFO][4574] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0 calico-apiserver-7664dbdf7c- calico-apiserver 245c2865-77c9-4af3-afa1-058bc899e239 1005 0 2025-05-17 00:35:28 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7664dbdf7c projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-6a88388a60 calico-apiserver-7664dbdf7c-5265z eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0ce7dba7936 [] [] }} ContainerID="fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66" Namespace="calico-apiserver" Pod="calico-apiserver-7664dbdf7c-5265z" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-" May 17 00:36:02.615238 env[1435]: 2025-05-17 00:36:02.417 [INFO][4574] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66" Namespace="calico-apiserver" Pod="calico-apiserver-7664dbdf7c-5265z" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0" May 17 00:36:02.615238 env[1435]: 2025-05-17 00:36:02.486 [INFO][4599] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66" HandleID="k8s-pod-network.fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0" May 17 00:36:02.615238 env[1435]: 2025-05-17 00:36:02.487 [INFO][4599] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66" HandleID="k8s-pod-network.fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ad4d0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-6a88388a60", "pod":"calico-apiserver-7664dbdf7c-5265z", "timestamp":"2025-05-17 00:36:02.4869307 +0000 UTC"}, Hostname:"ci-3510.3.7-n-6a88388a60", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:36:02.615238 env[1435]: 2025-05-17 00:36:02.487 [INFO][4599] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:02.615238 env[1435]: 2025-05-17 00:36:02.487 [INFO][4599] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:02.615238 env[1435]: 2025-05-17 00:36:02.487 [INFO][4599] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-6a88388a60' May 17 00:36:02.615238 env[1435]: 2025-05-17 00:36:02.496 [INFO][4599] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:02.615238 env[1435]: 2025-05-17 00:36:02.502 [INFO][4599] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-6a88388a60" May 17 00:36:02.615238 env[1435]: 2025-05-17 00:36:02.521 [INFO][4599] ipam/ipam.go 511: Trying affinity for 192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:36:02.615238 env[1435]: 2025-05-17 00:36:02.525 [INFO][4599] ipam/ipam.go 158: Attempting to load block cidr=192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:36:02.615238 env[1435]: 2025-05-17 00:36:02.528 [INFO][4599] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:36:02.615238 env[1435]: 2025-05-17 00:36:02.528 [INFO][4599] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.93.64/26 handle="k8s-pod-network.fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:02.615238 env[1435]: 2025-05-17 00:36:02.530 [INFO][4599] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66 May 17 00:36:02.615238 env[1435]: 2025-05-17 00:36:02.540 [INFO][4599] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.93.64/26 handle="k8s-pod-network.fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:02.615238 env[1435]: 2025-05-17 00:36:02.551 [INFO][4599] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.93.71/26] block=192.168.93.64/26 handle="k8s-pod-network.fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:02.615238 env[1435]: 2025-05-17 00:36:02.551 [INFO][4599] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.93.71/26] handle="k8s-pod-network.fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:02.615238 env[1435]: 2025-05-17 00:36:02.551 [INFO][4599] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:02.615238 env[1435]: 2025-05-17 00:36:02.551 [INFO][4599] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.93.71/26] IPv6=[] ContainerID="fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66" HandleID="k8s-pod-network.fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0" May 17 00:36:02.616156 env[1435]: 2025-05-17 00:36:02.553 [INFO][4574] cni-plugin/k8s.go 418: Populated endpoint ContainerID="fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66" Namespace="calico-apiserver" Pod="calico-apiserver-7664dbdf7c-5265z" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0", GenerateName:"calico-apiserver-7664dbdf7c-", Namespace:"calico-apiserver", SelfLink:"", UID:"245c2865-77c9-4af3-afa1-058bc899e239", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7664dbdf7c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"", Pod:"calico-apiserver-7664dbdf7c-5265z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.93.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0ce7dba7936", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:02.616156 env[1435]: 2025-05-17 00:36:02.553 [INFO][4574] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.93.71/32] ContainerID="fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66" Namespace="calico-apiserver" Pod="calico-apiserver-7664dbdf7c-5265z" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0" May 17 00:36:02.616156 env[1435]: 2025-05-17 00:36:02.553 [INFO][4574] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0ce7dba7936 ContainerID="fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66" Namespace="calico-apiserver" Pod="calico-apiserver-7664dbdf7c-5265z" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0" May 17 00:36:02.616156 env[1435]: 2025-05-17 00:36:02.595 [INFO][4574] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66" Namespace="calico-apiserver" Pod="calico-apiserver-7664dbdf7c-5265z" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0" May 17 00:36:02.616156 env[1435]: 2025-05-17 00:36:02.595 [INFO][4574] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66" Namespace="calico-apiserver" Pod="calico-apiserver-7664dbdf7c-5265z" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0", GenerateName:"calico-apiserver-7664dbdf7c-", Namespace:"calico-apiserver", SelfLink:"", UID:"245c2865-77c9-4af3-afa1-058bc899e239", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7664dbdf7c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66", Pod:"calico-apiserver-7664dbdf7c-5265z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.93.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0ce7dba7936", MAC:"0a:ed:8b:59:45:b4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:02.616156 env[1435]: 2025-05-17 00:36:02.613 [INFO][4574] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66" Namespace="calico-apiserver" Pod="calico-apiserver-7664dbdf7c-5265z" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0" May 17 00:36:02.664024 env[1435]: time="2025-05-17T00:36:02.663942407Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:02.666324 env[1435]: time="2025-05-17T00:36:02.666277462Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:02.666506 env[1435]: time="2025-05-17T00:36:02.666476767Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:02.667562 env[1435]: time="2025-05-17T00:36:02.667518492Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66 pid=4631 runtime=io.containerd.runc.v2 May 17 00:36:02.677000 audit[4632]: NETFILTER_CFG table=filter:121 family=2 entries=57 op=nft_register_chain pid=4632 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:02.677000 audit[4632]: SYSCALL arch=c000003e syscall=46 success=yes exit=27828 a0=3 a1=7ffd3fd34a60 a2=0 a3=7ffd3fd34a4c items=0 ppid=3794 pid=4632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:02.677000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:02.707913 systemd[1]: Started cri-containerd-fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66.scope. May 17 00:36:02.736739 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid201098ce91: link becomes ready May 17 00:36:02.736196 systemd-networkd[1593]: calid201098ce91: Link UP May 17 00:36:02.736447 systemd-networkd[1593]: calid201098ce91: Gained carrier May 17 00:36:02.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.748000 audit: BPF prog-id=194 op=LOAD May 17 00:36:02.749000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.749000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4631 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:02.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661303737623134636161376134343562316663653164326238313838 May 17 00:36:02.749000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.749000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4631 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:02.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661303737623134636161376134343562316663653164326238313838 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit: BPF prog-id=195 op=LOAD May 17 00:36:02.754000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030c350 items=0 ppid=4631 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:02.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661303737623134636161376134343562316663653164326238313838 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit: BPF prog-id=196 op=LOAD May 17 00:36:02.754000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030c398 items=0 ppid=4631 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:02.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661303737623134636161376134343562316663653164326238313838 May 17 00:36:02.754000 audit: BPF prog-id=196 op=UNLOAD May 17 00:36:02.754000 audit: BPF prog-id=195 op=UNLOAD May 17 00:36:02.754000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.754000 audit: BPF prog-id=197 op=LOAD May 17 00:36:02.754000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030c7a8 items=0 ppid=4631 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:02.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661303737623134636161376134343562316663653164326238313838 May 17 00:36:02.763684 env[1435]: 2025-05-17 00:36:02.537 [INFO][4589] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0 goldmane-78d55f7ddc- calico-system 90fc490d-b68e-41e0-a777-9015e6ba2a3c 1007 0 2025-05-17 00:35:31 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:78d55f7ddc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s ci-3510.3.7-n-6a88388a60 goldmane-78d55f7ddc-ktd8c eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] calid201098ce91 [] [] }} ContainerID="5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92" Namespace="calico-system" Pod="goldmane-78d55f7ddc-ktd8c" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-" May 17 00:36:02.763684 env[1435]: 2025-05-17 00:36:02.538 [INFO][4589] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92" Namespace="calico-system" Pod="goldmane-78d55f7ddc-ktd8c" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0" May 17 00:36:02.763684 env[1435]: 2025-05-17 00:36:02.657 [INFO][4612] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92" HandleID="k8s-pod-network.5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92" Workload="ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0" May 17 00:36:02.763684 env[1435]: 2025-05-17 00:36:02.658 [INFO][4612] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92" HandleID="k8s-pod-network.5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92" Workload="ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000235a20), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-6a88388a60", "pod":"goldmane-78d55f7ddc-ktd8c", "timestamp":"2025-05-17 00:36:02.657229947 +0000 UTC"}, Hostname:"ci-3510.3.7-n-6a88388a60", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:36:02.763684 env[1435]: 2025-05-17 00:36:02.658 [INFO][4612] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:02.763684 env[1435]: 2025-05-17 00:36:02.658 [INFO][4612] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:02.763684 env[1435]: 2025-05-17 00:36:02.658 [INFO][4612] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-6a88388a60' May 17 00:36:02.763684 env[1435]: 2025-05-17 00:36:02.670 [INFO][4612] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:02.763684 env[1435]: 2025-05-17 00:36:02.677 [INFO][4612] ipam/ipam.go 394: Looking up existing affinities for host host="ci-3510.3.7-n-6a88388a60" May 17 00:36:02.763684 env[1435]: 2025-05-17 00:36:02.685 [INFO][4612] ipam/ipam.go 511: Trying affinity for 192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:36:02.763684 env[1435]: 2025-05-17 00:36:02.687 [INFO][4612] ipam/ipam.go 158: Attempting to load block cidr=192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:36:02.763684 env[1435]: 2025-05-17 00:36:02.693 [INFO][4612] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.93.64/26 host="ci-3510.3.7-n-6a88388a60" May 17 00:36:02.763684 env[1435]: 2025-05-17 00:36:02.694 [INFO][4612] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.93.64/26 handle="k8s-pod-network.5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:02.763684 env[1435]: 2025-05-17 00:36:02.700 [INFO][4612] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92 May 17 00:36:02.763684 env[1435]: 2025-05-17 00:36:02.712 [INFO][4612] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.93.64/26 handle="k8s-pod-network.5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:02.763684 env[1435]: 2025-05-17 00:36:02.725 [INFO][4612] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.93.72/26] block=192.168.93.64/26 handle="k8s-pod-network.5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:02.763684 env[1435]: 2025-05-17 00:36:02.725 [INFO][4612] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.93.72/26] handle="k8s-pod-network.5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92" host="ci-3510.3.7-n-6a88388a60" May 17 00:36:02.763684 env[1435]: 2025-05-17 00:36:02.725 [INFO][4612] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:02.763684 env[1435]: 2025-05-17 00:36:02.725 [INFO][4612] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.93.72/26] IPv6=[] ContainerID="5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92" HandleID="k8s-pod-network.5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92" Workload="ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0" May 17 00:36:02.766079 env[1435]: 2025-05-17 00:36:02.728 [INFO][4589] cni-plugin/k8s.go 418: Populated endpoint ContainerID="5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92" Namespace="calico-system" Pod="goldmane-78d55f7ddc-ktd8c" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"90fc490d-b68e-41e0-a777-9015e6ba2a3c", ResourceVersion:"1007", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"", Pod:"goldmane-78d55f7ddc-ktd8c", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.93.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calid201098ce91", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:02.766079 env[1435]: 2025-05-17 00:36:02.728 [INFO][4589] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.93.72/32] ContainerID="5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92" Namespace="calico-system" Pod="goldmane-78d55f7ddc-ktd8c" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0" May 17 00:36:02.766079 env[1435]: 2025-05-17 00:36:02.728 [INFO][4589] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid201098ce91 ContainerID="5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92" Namespace="calico-system" Pod="goldmane-78d55f7ddc-ktd8c" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0" May 17 00:36:02.766079 env[1435]: 2025-05-17 00:36:02.738 [INFO][4589] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92" Namespace="calico-system" Pod="goldmane-78d55f7ddc-ktd8c" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0" May 17 00:36:02.766079 env[1435]: 2025-05-17 00:36:02.738 [INFO][4589] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92" Namespace="calico-system" Pod="goldmane-78d55f7ddc-ktd8c" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"90fc490d-b68e-41e0-a777-9015e6ba2a3c", ResourceVersion:"1007", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92", Pod:"goldmane-78d55f7ddc-ktd8c", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.93.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calid201098ce91", MAC:"ca:c6:5c:14:0b:e3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:02.766079 env[1435]: 2025-05-17 00:36:02.762 [INFO][4589] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92" Namespace="calico-system" Pod="goldmane-78d55f7ddc-ktd8c" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0" May 17 00:36:02.818887 env[1435]: time="2025-05-17T00:36:02.818815988Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:36:02.819113 env[1435]: time="2025-05-17T00:36:02.819083894Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:36:02.819268 env[1435]: time="2025-05-17T00:36:02.819241098Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:36:02.819620 env[1435]: time="2025-05-17T00:36:02.819544905Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92 pid=4674 runtime=io.containerd.runc.v2 May 17 00:36:02.820032 env[1435]: time="2025-05-17T00:36:02.819989216Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7664dbdf7c-5265z,Uid:245c2865-77c9-4af3-afa1-058bc899e239,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66\"" May 17 00:36:02.849587 systemd[1]: Started cri-containerd-5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92.scope. May 17 00:36:02.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit: BPF prog-id=198 op=LOAD May 17 00:36:02.871000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit[4685]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4674 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:02.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566356535653666656237623939376634323238636638356633333732 May 17 00:36:02.871000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit[4685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4674 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:02.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566356535653666656237623939376634323238636638356633333732 May 17 00:36:02.871000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.871000 audit: BPF prog-id=199 op=LOAD May 17 00:36:02.871000 audit[4685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002f8670 items=0 ppid=4674 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:02.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566356535653666656237623939376634323238636638356633333732 May 17 00:36:02.872000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.872000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.872000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.872000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.872000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.872000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.872000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.872000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.872000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.872000 audit: BPF prog-id=200 op=LOAD May 17 00:36:02.872000 audit[4685]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002f86b8 items=0 ppid=4674 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:02.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566356535653666656237623939376634323238636638356633333732 May 17 00:36:02.872000 audit: BPF prog-id=200 op=UNLOAD May 17 00:36:02.872000 audit: BPF prog-id=199 op=UNLOAD May 17 00:36:02.872000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.872000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.872000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.872000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.872000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.872000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.872000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.872000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.872000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.872000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:02.872000 audit: BPF prog-id=201 op=LOAD May 17 00:36:02.872000 audit[4685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002f8ac8 items=0 ppid=4674 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:02.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566356535653666656237623939376634323238636638356633333732 May 17 00:36:02.922000 audit[4702]: NETFILTER_CFG table=filter:122 family=2 entries=68 op=nft_register_chain pid=4702 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:36:02.922000 audit[4702]: SYSCALL arch=c000003e syscall=46 success=yes exit=32308 a0=3 a1=7ffcfc5b3040 a2=0 a3=7ffcfc5b302c items=0 ppid=3794 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:02.922000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:36:02.940974 env[1435]: time="2025-05-17T00:36:02.940916090Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-ktd8c,Uid:90fc490d-b68e-41e0-a777-9015e6ba2a3c,Namespace:calico-system,Attempt:1,} returns sandbox id \"5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92\"" May 17 00:36:03.021105 systemd-networkd[1593]: calicea31a03268: Gained IPv6LL May 17 00:36:03.393280 env[1435]: time="2025-05-17T00:36:03.393229465Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:03.406984 env[1435]: time="2025-05-17T00:36:03.406927484Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:03.411504 env[1435]: time="2025-05-17T00:36:03.411454790Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:03.418017 env[1435]: time="2025-05-17T00:36:03.417972842Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:03.418508 env[1435]: time="2025-05-17T00:36:03.418471253Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:36:03.420737 env[1435]: time="2025-05-17T00:36:03.420707806Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:36:03.427610 env[1435]: time="2025-05-17T00:36:03.427473763Z" level=info msg="CreateContainer within sandbox \"ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:36:03.467711 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount286802792.mount: Deactivated successfully. May 17 00:36:03.487492 env[1435]: time="2025-05-17T00:36:03.487443562Z" level=info msg="CreateContainer within sandbox \"ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"fa01c4b40a72dae59a15a9f5f9346edafc32df81ffa0428725c217b3981510ed\"" May 17 00:36:03.489656 env[1435]: time="2025-05-17T00:36:03.488317782Z" level=info msg="StartContainer for \"fa01c4b40a72dae59a15a9f5f9346edafc32df81ffa0428725c217b3981510ed\"" May 17 00:36:03.517816 systemd[1]: Started cri-containerd-fa01c4b40a72dae59a15a9f5f9346edafc32df81ffa0428725c217b3981510ed.scope. May 17 00:36:03.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.530000 audit: BPF prog-id=202 op=LOAD May 17 00:36:03.531000 audit[4717]: AVC avc: denied { bpf } for pid=4717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.531000 audit[4717]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3997 pid=4717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:03.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661303163346234306137326461653539613135613966356639333436 May 17 00:36:03.531000 audit[4717]: AVC avc: denied { perfmon } for pid=4717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.531000 audit[4717]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3997 pid=4717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:03.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661303163346234306137326461653539613135613966356639333436 May 17 00:36:03.531000 audit[4717]: AVC avc: denied { bpf } for pid=4717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.531000 audit[4717]: AVC avc: denied { bpf } for pid=4717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.531000 audit[4717]: AVC avc: denied { bpf } for pid=4717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.531000 audit[4717]: AVC avc: denied { perfmon } for pid=4717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.531000 audit[4717]: AVC avc: denied { perfmon } for pid=4717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.531000 audit[4717]: AVC avc: denied { perfmon } for pid=4717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.531000 audit[4717]: AVC avc: denied { perfmon } for pid=4717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.531000 audit[4717]: AVC avc: denied { perfmon } for pid=4717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.531000 audit[4717]: AVC avc: denied { bpf } for pid=4717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.531000 audit[4717]: AVC avc: denied { bpf } for pid=4717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.531000 audit: BPF prog-id=203 op=LOAD May 17 00:36:03.531000 audit[4717]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028ed80 items=0 ppid=3997 pid=4717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:03.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661303163346234306137326461653539613135613966356639333436 May 17 00:36:03.531000 audit[4717]: AVC avc: denied { bpf } for pid=4717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.531000 audit[4717]: AVC avc: denied { bpf } for pid=4717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.531000 audit[4717]: AVC avc: denied { perfmon } for pid=4717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.531000 audit[4717]: AVC avc: denied { perfmon } for pid=4717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.531000 audit[4717]: AVC avc: denied { perfmon } for pid=4717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.531000 audit[4717]: AVC avc: denied { perfmon } for pid=4717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.531000 audit[4717]: AVC avc: denied { perfmon } for pid=4717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.531000 audit[4717]: AVC avc: denied { bpf } for pid=4717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.531000 audit[4717]: AVC avc: denied { bpf } for pid=4717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.531000 audit: BPF prog-id=204 op=LOAD May 17 00:36:03.531000 audit[4717]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028edc8 items=0 ppid=3997 pid=4717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:03.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661303163346234306137326461653539613135613966356639333436 May 17 00:36:03.532000 audit: BPF prog-id=204 op=UNLOAD May 17 00:36:03.532000 audit: BPF prog-id=203 op=UNLOAD May 17 00:36:03.532000 audit[4717]: AVC avc: denied { bpf } for pid=4717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.532000 audit[4717]: AVC avc: denied { bpf } for pid=4717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.532000 audit[4717]: AVC avc: denied { bpf } for pid=4717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.532000 audit[4717]: AVC avc: denied { perfmon } for pid=4717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.532000 audit[4717]: AVC avc: denied { perfmon } for pid=4717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.532000 audit[4717]: AVC avc: denied { perfmon } for pid=4717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.532000 audit[4717]: AVC avc: denied { perfmon } for pid=4717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.532000 audit[4717]: AVC avc: denied { perfmon } for pid=4717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.532000 audit[4717]: AVC avc: denied { bpf } for pid=4717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.532000 audit[4717]: AVC avc: denied { bpf } for pid=4717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:03.532000 audit: BPF prog-id=205 op=LOAD May 17 00:36:03.532000 audit[4717]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028f1d8 items=0 ppid=3997 pid=4717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:03.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661303163346234306137326461653539613135613966356639333436 May 17 00:36:03.566014 env[1435]: time="2025-05-17T00:36:03.565901391Z" level=info msg="StartContainer for \"fa01c4b40a72dae59a15a9f5f9346edafc32df81ffa0428725c217b3981510ed\" returns successfully" May 17 00:36:03.596639 systemd-networkd[1593]: cali1f4abdcc7aa: Gained IPv6LL May 17 00:36:03.852630 systemd-networkd[1593]: calid201098ce91: Gained IPv6LL May 17 00:36:04.138731 systemd[1]: run-containerd-runc-k8s.io-fa01c4b40a72dae59a15a9f5f9346edafc32df81ffa0428725c217b3981510ed-runc.4uY7d9.mount: Deactivated successfully. May 17 00:36:04.300595 systemd-networkd[1593]: cali0ce7dba7936: Gained IPv6LL May 17 00:36:04.339000 audit[4759]: NETFILTER_CFG table=filter:123 family=2 entries=14 op=nft_register_rule pid=4759 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:04.339000 audit[4759]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fffcb84e770 a2=0 a3=7fffcb84e75c items=0 ppid=2559 pid=4759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:04.339000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:04.344000 audit[4759]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=4759 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:04.344000 audit[4759]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffcb84e770 a2=0 a3=7fffcb84e75c items=0 ppid=2559 pid=4759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:04.344000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:04.847000 audit[4728]: AVC avc: denied { watch } for pid=4728 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_35_46.4159674763/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c286,c954 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c286,c954 tclass=file permissive=0 May 17 00:36:04.847000 audit[4728]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0006a9980 a2=fc6 a3=0 items=0 ppid=3997 pid=4728 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c286,c954 key=(null) May 17 00:36:04.847000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:36:05.032169 env[1435]: time="2025-05-17T00:36:05.032114820Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:05.039293 env[1435]: time="2025-05-17T00:36:05.039223680Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:05.044888 env[1435]: time="2025-05-17T00:36:05.044844206Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:05.050218 env[1435]: time="2025-05-17T00:36:05.050178526Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:05.050617 env[1435]: time="2025-05-17T00:36:05.050579635Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:36:05.052680 env[1435]: time="2025-05-17T00:36:05.052095069Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\"" May 17 00:36:05.061600 env[1435]: time="2025-05-17T00:36:05.061554581Z" level=info msg="CreateContainer within sandbox \"7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:36:05.107974 env[1435]: time="2025-05-17T00:36:05.107540714Z" level=info msg="CreateContainer within sandbox \"7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"7a1dc5cb675eea42cbfb93d60c676ad686d13724a73c8d2a065e536d2f91e240\"" May 17 00:36:05.108827 env[1435]: time="2025-05-17T00:36:05.108793642Z" level=info msg="StartContainer for \"7a1dc5cb675eea42cbfb93d60c676ad686d13724a73c8d2a065e536d2f91e240\"" May 17 00:36:05.139892 systemd[1]: run-containerd-runc-k8s.io-7a1dc5cb675eea42cbfb93d60c676ad686d13724a73c8d2a065e536d2f91e240-runc.UYC9br.mount: Deactivated successfully. May 17 00:36:05.146103 systemd[1]: Started cri-containerd-7a1dc5cb675eea42cbfb93d60c676ad686d13724a73c8d2a065e536d2f91e240.scope. May 17 00:36:05.167000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.167000 audit[4766]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3a2280c0f8 items=0 ppid=4225 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761316463356362363735656561343263626662393364363063363736 May 17 00:36:05.167000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.167000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.167000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.167000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.167000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.167000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.167000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.167000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.167000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.167000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.167000 audit: BPF prog-id=206 op=LOAD May 17 00:36:05.167000 audit[4766]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000341548 items=0 ppid=4225 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761316463356362363735656561343263626662393364363063363736 May 17 00:36:05.168000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.168000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.168000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.168000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.168000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.168000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.168000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.168000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.168000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.168000 audit: BPF prog-id=207 op=LOAD May 17 00:36:05.168000 audit[4766]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000341598 items=0 ppid=4225 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761316463356362363735656561343263626662393364363063363736 May 17 00:36:05.169000 audit: BPF prog-id=207 op=UNLOAD May 17 00:36:05.169000 audit: BPF prog-id=206 op=UNLOAD May 17 00:36:05.169000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.169000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.169000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.169000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.169000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.169000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.169000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.169000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.169000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.169000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:05.169000 audit: BPF prog-id=208 op=LOAD May 17 00:36:05.169000 audit[4766]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000341628 items=0 ppid=4225 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:05.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761316463356362363735656561343263626662393364363063363736 May 17 00:36:05.188914 env[1435]: time="2025-05-17T00:36:05.188870241Z" level=info msg="StartContainer for \"7a1dc5cb675eea42cbfb93d60c676ad686d13724a73c8d2a065e536d2f91e240\" returns successfully" May 17 00:36:05.272329 kubelet[2423]: I0517 00:36:05.272295 2423 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:36:08.987458 kubelet[2423]: I0517 00:36:08.987218 2423 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7664dbdf7c-5c5jt" podStartSLOduration=36.063179389 podStartE2EDuration="40.987196469s" podCreationTimestamp="2025-05-17 00:35:28 +0000 UTC" firstStartedPulling="2025-05-17 00:35:58.495893407 +0000 UTC m=+44.646924982" lastFinishedPulling="2025-05-17 00:36:03.419910487 +0000 UTC m=+49.570942062" observedRunningTime="2025-05-17 00:36:04.300184084 +0000 UTC m=+50.451215659" watchObservedRunningTime="2025-05-17 00:36:08.987196469 +0000 UTC m=+55.138228144" May 17 00:36:09.234281 env[1435]: time="2025-05-17T00:36:09.234226137Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:09.241935 env[1435]: time="2025-05-17T00:36:09.241832296Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:09.246368 env[1435]: time="2025-05-17T00:36:09.246327490Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:09.251739 env[1435]: time="2025-05-17T00:36:09.251703902Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:09.252112 env[1435]: time="2025-05-17T00:36:09.252081410Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\" returns image reference \"sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50\"" May 17 00:36:09.256449 env[1435]: time="2025-05-17T00:36:09.253902948Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:36:09.279951 env[1435]: time="2025-05-17T00:36:09.279911292Z" level=info msg="CreateContainer within sandbox \"7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 17 00:36:09.324453 env[1435]: time="2025-05-17T00:36:09.324381321Z" level=info msg="CreateContainer within sandbox \"7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"2c17f355c1d42e08a0b7154544a8c6b9372d0fdc8628bfaec097d6fe2cbbdf8b\"" May 17 00:36:09.325372 env[1435]: time="2025-05-17T00:36:09.325338641Z" level=info msg="StartContainer for \"2c17f355c1d42e08a0b7154544a8c6b9372d0fdc8628bfaec097d6fe2cbbdf8b\"" May 17 00:36:09.358251 systemd[1]: Started cri-containerd-2c17f355c1d42e08a0b7154544a8c6b9372d0fdc8628bfaec097d6fe2cbbdf8b.scope. May 17 00:36:09.375252 kernel: kauditd_printk_skb: 597 callbacks suppressed May 17 00:36:09.375369 kernel: audit: type=1400 audit(1747442169.370:1353): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.401409 kernel: audit: type=1400 audit(1747442169.370:1354): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.426346 kernel: audit: type=1400 audit(1747442169.370:1355): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.426453 kernel: audit: type=1400 audit(1747442169.370:1356): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.450917 kernel: audit: type=1400 audit(1747442169.370:1357): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.451060 kernel: audit: type=1400 audit(1747442169.370:1358): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.475073 kernel: audit: type=1400 audit(1747442169.370:1359): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.475227 kernel: audit: type=1400 audit(1747442169.370:1360): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.488878 kernel: audit: type=1400 audit(1747442169.370:1361): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.502403 kernel: audit: type=1400 audit(1747442169.388:1362): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.388000 audit: BPF prog-id=209 op=LOAD May 17 00:36:09.388000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.388000 audit[4811]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4443 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263313766333535633164343265303861306237313534353434613863 May 17 00:36:09.388000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.388000 audit[4811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4443 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263313766333535633164343265303861306237313534353434613863 May 17 00:36:09.388000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.388000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.388000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.388000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.388000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.388000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.388000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.388000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.388000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.388000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.388000 audit: BPF prog-id=210 op=LOAD May 17 00:36:09.388000 audit[4811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000309220 items=0 ppid=4443 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263313766333535633164343265303861306237313534353434613863 May 17 00:36:09.401000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.401000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.401000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.401000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.401000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.401000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.401000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.401000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.401000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.401000 audit: BPF prog-id=211 op=LOAD May 17 00:36:09.401000 audit[4811]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000309268 items=0 ppid=4443 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263313766333535633164343265303861306237313534353434613863 May 17 00:36:09.401000 audit: BPF prog-id=211 op=UNLOAD May 17 00:36:09.401000 audit: BPF prog-id=210 op=UNLOAD May 17 00:36:09.401000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.401000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.401000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.401000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.401000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.401000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.401000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.401000 audit[4811]: AVC avc: denied { perfmon } for pid=4811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.401000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.401000 audit[4811]: AVC avc: denied { bpf } for pid=4811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.401000 audit: BPF prog-id=212 op=LOAD May 17 00:36:09.401000 audit[4811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000309678 items=0 ppid=4443 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263313766333535633164343265303861306237313534353434613863 May 17 00:36:09.511118 env[1435]: time="2025-05-17T00:36:09.511071623Z" level=info msg="StartContainer for \"2c17f355c1d42e08a0b7154544a8c6b9372d0fdc8628bfaec097d6fe2cbbdf8b\" returns successfully" May 17 00:36:09.623516 env[1435]: time="2025-05-17T00:36:09.623462772Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:09.632621 env[1435]: time="2025-05-17T00:36:09.632565362Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:09.638973 env[1435]: time="2025-05-17T00:36:09.638913595Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:09.643725 env[1435]: time="2025-05-17T00:36:09.643681395Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:09.644225 env[1435]: time="2025-05-17T00:36:09.644192205Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:36:09.646654 env[1435]: time="2025-05-17T00:36:09.646151746Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:36:09.655084 env[1435]: time="2025-05-17T00:36:09.655037932Z" level=info msg="CreateContainer within sandbox \"fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:36:09.705930 env[1435]: time="2025-05-17T00:36:09.705754292Z" level=info msg="CreateContainer within sandbox \"fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"47aff7f847f907abac8b0c1a2257991c8329eb37e12f902fa16d431c5f5d5334\"" May 17 00:36:09.706535 env[1435]: time="2025-05-17T00:36:09.706503008Z" level=info msg="StartContainer for \"47aff7f847f907abac8b0c1a2257991c8329eb37e12f902fa16d431c5f5d5334\"" May 17 00:36:09.725808 systemd[1]: Started cri-containerd-47aff7f847f907abac8b0c1a2257991c8329eb37e12f902fa16d431c5f5d5334.scope. May 17 00:36:09.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.740000 audit: BPF prog-id=213 op=LOAD May 17 00:36:09.741000 audit[4855]: AVC avc: denied { bpf } for pid=4855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.741000 audit[4855]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4631 pid=4855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437616666376638343766393037616261633862306331613232353739 May 17 00:36:09.742000 audit[4855]: AVC avc: denied { perfmon } for pid=4855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.742000 audit[4855]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4631 pid=4855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437616666376638343766393037616261633862306331613232353739 May 17 00:36:09.742000 audit[4855]: AVC avc: denied { bpf } for pid=4855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.742000 audit[4855]: AVC avc: denied { bpf } for pid=4855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.742000 audit[4855]: AVC avc: denied { bpf } for pid=4855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.742000 audit[4855]: AVC avc: denied { perfmon } for pid=4855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.742000 audit[4855]: AVC avc: denied { perfmon } for pid=4855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.742000 audit[4855]: AVC avc: denied { perfmon } for pid=4855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.742000 audit[4855]: AVC avc: denied { perfmon } for pid=4855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.742000 audit[4855]: AVC avc: denied { perfmon } for pid=4855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.742000 audit[4855]: AVC avc: denied { bpf } for pid=4855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.742000 audit[4855]: AVC avc: denied { bpf } for pid=4855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.742000 audit: BPF prog-id=214 op=LOAD May 17 00:36:09.742000 audit[4855]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000305660 items=0 ppid=4631 pid=4855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437616666376638343766393037616261633862306331613232353739 May 17 00:36:09.742000 audit[4855]: AVC avc: denied { bpf } for pid=4855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.742000 audit[4855]: AVC avc: denied { bpf } for pid=4855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.742000 audit[4855]: AVC avc: denied { perfmon } for pid=4855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.742000 audit[4855]: AVC avc: denied { perfmon } for pid=4855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.742000 audit[4855]: AVC avc: denied { perfmon } for pid=4855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.742000 audit[4855]: AVC avc: denied { perfmon } for pid=4855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.742000 audit[4855]: AVC avc: denied { perfmon } for pid=4855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.742000 audit[4855]: AVC avc: denied { bpf } for pid=4855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.742000 audit[4855]: AVC avc: denied { bpf } for pid=4855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.742000 audit: BPF prog-id=215 op=LOAD May 17 00:36:09.742000 audit[4855]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003056a8 items=0 ppid=4631 pid=4855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437616666376638343766393037616261633862306331613232353739 May 17 00:36:09.743000 audit: BPF prog-id=215 op=UNLOAD May 17 00:36:09.743000 audit: BPF prog-id=214 op=UNLOAD May 17 00:36:09.743000 audit[4855]: AVC avc: denied { bpf } for pid=4855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.743000 audit[4855]: AVC avc: denied { bpf } for pid=4855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.743000 audit[4855]: AVC avc: denied { bpf } for pid=4855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.743000 audit[4855]: AVC avc: denied { perfmon } for pid=4855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.743000 audit[4855]: AVC avc: denied { perfmon } for pid=4855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.743000 audit[4855]: AVC avc: denied { perfmon } for pid=4855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.743000 audit[4855]: AVC avc: denied { perfmon } for pid=4855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.743000 audit[4855]: AVC avc: denied { perfmon } for pid=4855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.743000 audit[4855]: AVC avc: denied { bpf } for pid=4855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.743000 audit[4855]: AVC avc: denied { bpf } for pid=4855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:09.743000 audit: BPF prog-id=216 op=LOAD May 17 00:36:09.743000 audit[4855]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000305ab8 items=0 ppid=4631 pid=4855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:09.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437616666376638343766393037616261633862306331613232353739 May 17 00:36:09.754000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:09.754000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0023e2cc0 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:36:09.754000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:09.755000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:09.755000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001887950 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:36:09.755000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:09.778316 env[1435]: time="2025-05-17T00:36:09.778264808Z" level=info msg="StartContainer for \"47aff7f847f907abac8b0c1a2257991c8329eb37e12f902fa16d431c5f5d5334\" returns successfully" May 17 00:36:09.850628 env[1435]: time="2025-05-17T00:36:09.850558419Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:36:09.854124 env[1435]: time="2025-05-17T00:36:09.854063992Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:36:09.854588 kubelet[2423]: E0517 00:36:09.854540 2423 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:36:09.854759 kubelet[2423]: E0517 00:36:09.854742 2423 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:36:09.855504 kubelet[2423]: E0517 00:36:09.855385 2423 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-nl5jn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-ktd8c_calico-system(90fc490d-b68e-41e0-a777-9015e6ba2a3c): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:36:09.856061 env[1435]: time="2025-05-17T00:36:09.856037633Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:36:09.857652 kubelet[2423]: E0517 00:36:09.857609 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-ktd8c" podUID="90fc490d-b68e-41e0-a777-9015e6ba2a3c" May 17 00:36:10.290745 kubelet[2423]: E0517 00:36:10.290689 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-ktd8c" podUID="90fc490d-b68e-41e0-a777-9015e6ba2a3c" May 17 00:36:10.305564 kubelet[2423]: I0517 00:36:10.305503 2423 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7664dbdf7c-5265z" podStartSLOduration=35.481858745 podStartE2EDuration="42.305484817s" podCreationTimestamp="2025-05-17 00:35:28 +0000 UTC" firstStartedPulling="2025-05-17 00:36:02.821784259 +0000 UTC m=+48.972815834" lastFinishedPulling="2025-05-17 00:36:09.645410231 +0000 UTC m=+55.796441906" observedRunningTime="2025-05-17 00:36:10.304079188 +0000 UTC m=+56.455110763" watchObservedRunningTime="2025-05-17 00:36:10.305484817 +0000 UTC m=+56.456516492" May 17 00:36:10.340000 audit[4889]: NETFILTER_CFG table=filter:125 family=2 entries=14 op=nft_register_rule pid=4889 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:10.340000 audit[4889]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffec0e173f0 a2=0 a3=7ffec0e173dc items=0 ppid=2559 pid=4889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:10.340000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:10.343298 kubelet[2423]: I0517 00:36:10.343249 2423 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5f47758c9f-l26k9" podStartSLOduration=32.000276108 podStartE2EDuration="39.343232292s" podCreationTimestamp="2025-05-17 00:35:31 +0000 UTC" firstStartedPulling="2025-05-17 00:36:01.910168848 +0000 UTC m=+48.061200523" lastFinishedPulling="2025-05-17 00:36:09.253125032 +0000 UTC m=+55.404156707" observedRunningTime="2025-05-17 00:36:10.323983097 +0000 UTC m=+56.475014672" watchObservedRunningTime="2025-05-17 00:36:10.343232292 +0000 UTC m=+56.494263867" May 17 00:36:10.347000 audit[4889]: NETFILTER_CFG table=nat:126 family=2 entries=20 op=nft_register_rule pid=4889 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:10.347000 audit[4889]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffec0e173f0 a2=0 a3=7ffec0e173dc items=0 ppid=2559 pid=4889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:10.347000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:10.364000 audit[4891]: NETFILTER_CFG table=filter:127 family=2 entries=14 op=nft_register_rule pid=4891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:10.364000 audit[4891]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd2c327560 a2=0 a3=7ffd2c32754c items=0 ppid=2559 pid=4891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:10.364000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:10.366000 audit[4891]: NETFILTER_CFG table=nat:128 family=2 entries=20 op=nft_register_rule pid=4891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:10.366000 audit[4891]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd2c327560 a2=0 a3=7ffd2c32754c items=0 ppid=2559 pid=4891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:10.366000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:11.015000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:11.015000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:11.015000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c0067bf050 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:36:11.015000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:11.015000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=5267 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:11.015000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c0067bf110 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:36:11.015000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:11.015000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c005535540 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:36:11.015000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:11.035000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=5273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:11.035000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c0067bf1d0 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:36:11.035000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:11.107000 audit[4867]: AVC avc: denied { watch } for pid=4867 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_35_46.4068466090/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c726,c765 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c726,c765 tclass=file permissive=0 May 17 00:36:11.107000 audit[4867]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00281a6e0 a2=fc6 a3=0 items=0 ppid=4631 pid=4867 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c726,c765 key=(null) May 17 00:36:11.107000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:36:11.126000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:11.126000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c0081ad680 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:36:11.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:11.127000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:11.127000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c000f24240 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:36:11.127000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:36:11.292091 kubelet[2423]: I0517 00:36:11.291304 2423 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:36:12.122218 env[1435]: time="2025-05-17T00:36:12.122165100Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:12.131759 env[1435]: time="2025-05-17T00:36:12.131717190Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:12.135546 env[1435]: time="2025-05-17T00:36:12.135512465Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:12.139548 env[1435]: time="2025-05-17T00:36:12.139515245Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:36:12.139983 env[1435]: time="2025-05-17T00:36:12.139951353Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:36:12.142028 env[1435]: time="2025-05-17T00:36:12.141989194Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:36:12.147804 env[1435]: time="2025-05-17T00:36:12.147231198Z" level=info msg="CreateContainer within sandbox \"7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:36:12.185262 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3943631226.mount: Deactivated successfully. May 17 00:36:12.203517 env[1435]: time="2025-05-17T00:36:12.203468414Z" level=info msg="CreateContainer within sandbox \"7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"446505268d143883a4f2ab6bf1825c7978bf346cd7cbe2eb0b43400d22d7b907\"" May 17 00:36:12.204144 env[1435]: time="2025-05-17T00:36:12.204114927Z" level=info msg="StartContainer for \"446505268d143883a4f2ab6bf1825c7978bf346cd7cbe2eb0b43400d22d7b907\"" May 17 00:36:12.239585 systemd[1]: Started cri-containerd-446505268d143883a4f2ab6bf1825c7978bf346cd7cbe2eb0b43400d22d7b907.scope. May 17 00:36:12.255000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f38f10082f8 items=0 ppid=4225 pid=4917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434363530353236386431343338383361346632616236626631383235 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit: BPF prog-id=217 op=LOAD May 17 00:36:12.255000 audit[4917]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0000254e8 items=0 ppid=4225 pid=4917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434363530353236386431343338383361346632616236626631383235 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit: BPF prog-id=218 op=LOAD May 17 00:36:12.255000 audit[4917]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000025538 items=0 ppid=4225 pid=4917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434363530353236386431343338383361346632616236626631383235 May 17 00:36:12.255000 audit: BPF prog-id=218 op=UNLOAD May 17 00:36:12.255000 audit: BPF prog-id=217 op=UNLOAD May 17 00:36:12.255000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { perfmon } for pid=4917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit[4917]: AVC avc: denied { bpf } for pid=4917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:36:12.255000 audit: BPF prog-id=219 op=LOAD May 17 00:36:12.255000 audit[4917]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0000255c8 items=0 ppid=4225 pid=4917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:12.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434363530353236386431343338383361346632616236626631383235 May 17 00:36:12.284143 env[1435]: time="2025-05-17T00:36:12.284097315Z" level=info msg="StartContainer for \"446505268d143883a4f2ab6bf1825c7978bf346cd7cbe2eb0b43400d22d7b907\" returns successfully" May 17 00:36:12.305396 systemd[1]: run-containerd-runc-k8s.io-446505268d143883a4f2ab6bf1825c7978bf346cd7cbe2eb0b43400d22d7b907-runc.8By1DN.mount: Deactivated successfully. May 17 00:36:12.311916 kubelet[2423]: I0517 00:36:12.311854 2423 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-wk56l" podStartSLOduration=30.259834042 podStartE2EDuration="41.311836666s" podCreationTimestamp="2025-05-17 00:35:31 +0000 UTC" firstStartedPulling="2025-05-17 00:36:01.089071551 +0000 UTC m=+47.240103126" lastFinishedPulling="2025-05-17 00:36:12.141074075 +0000 UTC m=+58.292105750" observedRunningTime="2025-05-17 00:36:12.309711124 +0000 UTC m=+58.460742699" watchObservedRunningTime="2025-05-17 00:36:12.311836666 +0000 UTC m=+58.462868341" May 17 00:36:12.328038 env[1435]: time="2025-05-17T00:36:12.327989286Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:36:12.333862 env[1435]: time="2025-05-17T00:36:12.333821202Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:36:12.334214 kubelet[2423]: E0517 00:36:12.334163 2423 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:36:12.334332 kubelet[2423]: E0517 00:36:12.334226 2423 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:36:12.334443 kubelet[2423]: E0517 00:36:12.334362 2423 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:f4c4fa38b65b452f8870b25fcd45b50b,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-h5d82,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6564c697ff-q65rf_calico-system(403007e9-af7a-4a5d-9b90-5920611d9175): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:36:12.336771 env[1435]: time="2025-05-17T00:36:12.336741360Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:36:12.512530 env[1435]: time="2025-05-17T00:36:12.512449749Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:36:12.521841 env[1435]: time="2025-05-17T00:36:12.521778934Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:36:12.522103 kubelet[2423]: E0517 00:36:12.522045 2423 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:36:12.522217 kubelet[2423]: E0517 00:36:12.522123 2423 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:36:12.522817 kubelet[2423]: E0517 00:36:12.522756 2423 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-h5d82,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6564c697ff-q65rf_calico-system(403007e9-af7a-4a5d-9b90-5920611d9175): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:36:12.524858 kubelet[2423]: E0517 00:36:12.524796 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6564c697ff-q65rf" podUID="403007e9-af7a-4a5d-9b90-5920611d9175" May 17 00:36:13.092955 kubelet[2423]: I0517 00:36:13.092914 2423 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:36:13.093197 kubelet[2423]: I0517 00:36:13.092992 2423 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:36:13.988553 env[1435]: time="2025-05-17T00:36:13.988508931Z" level=info msg="StopPodSandbox for \"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\"" May 17 00:36:14.055780 env[1435]: 2025-05-17 00:36:14.022 [WARNING][4960] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"90fc490d-b68e-41e0-a777-9015e6ba2a3c", ResourceVersion:"1073", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92", Pod:"goldmane-78d55f7ddc-ktd8c", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.93.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calid201098ce91", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:14.055780 env[1435]: 2025-05-17 00:36:14.023 [INFO][4960] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" May 17 00:36:14.055780 env[1435]: 2025-05-17 00:36:14.023 [INFO][4960] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" iface="eth0" netns="" May 17 00:36:14.055780 env[1435]: 2025-05-17 00:36:14.023 [INFO][4960] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" May 17 00:36:14.055780 env[1435]: 2025-05-17 00:36:14.023 [INFO][4960] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" May 17 00:36:14.055780 env[1435]: 2025-05-17 00:36:14.045 [INFO][4968] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" HandleID="k8s-pod-network.57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" Workload="ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0" May 17 00:36:14.055780 env[1435]: 2025-05-17 00:36:14.045 [INFO][4968] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:14.055780 env[1435]: 2025-05-17 00:36:14.045 [INFO][4968] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:14.055780 env[1435]: 2025-05-17 00:36:14.051 [WARNING][4968] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" HandleID="k8s-pod-network.57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" Workload="ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0" May 17 00:36:14.055780 env[1435]: 2025-05-17 00:36:14.051 [INFO][4968] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" HandleID="k8s-pod-network.57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" Workload="ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0" May 17 00:36:14.055780 env[1435]: 2025-05-17 00:36:14.053 [INFO][4968] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:14.055780 env[1435]: 2025-05-17 00:36:14.054 [INFO][4960] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" May 17 00:36:14.056489 env[1435]: time="2025-05-17T00:36:14.055814227Z" level=info msg="TearDown network for sandbox \"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\" successfully" May 17 00:36:14.056489 env[1435]: time="2025-05-17T00:36:14.055851628Z" level=info msg="StopPodSandbox for \"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\" returns successfully" May 17 00:36:14.056489 env[1435]: time="2025-05-17T00:36:14.056453139Z" level=info msg="RemovePodSandbox for \"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\"" May 17 00:36:14.056671 env[1435]: time="2025-05-17T00:36:14.056490040Z" level=info msg="Forcibly stopping sandbox \"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\"" May 17 00:36:14.144452 env[1435]: 2025-05-17 00:36:14.108 [WARNING][4983] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"90fc490d-b68e-41e0-a777-9015e6ba2a3c", ResourceVersion:"1073", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"5f5e5e6feb7b997f4228cf85f3372faf2b5b013b109ca37a30bb3f5aa6743a92", Pod:"goldmane-78d55f7ddc-ktd8c", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.93.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calid201098ce91", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:14.144452 env[1435]: 2025-05-17 00:36:14.108 [INFO][4983] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" May 17 00:36:14.144452 env[1435]: 2025-05-17 00:36:14.108 [INFO][4983] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" iface="eth0" netns="" May 17 00:36:14.144452 env[1435]: 2025-05-17 00:36:14.108 [INFO][4983] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" May 17 00:36:14.144452 env[1435]: 2025-05-17 00:36:14.108 [INFO][4983] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" May 17 00:36:14.144452 env[1435]: 2025-05-17 00:36:14.134 [INFO][4990] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" HandleID="k8s-pod-network.57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" Workload="ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0" May 17 00:36:14.144452 env[1435]: 2025-05-17 00:36:14.135 [INFO][4990] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:14.144452 env[1435]: 2025-05-17 00:36:14.135 [INFO][4990] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:14.144452 env[1435]: 2025-05-17 00:36:14.140 [WARNING][4990] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" HandleID="k8s-pod-network.57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" Workload="ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0" May 17 00:36:14.144452 env[1435]: 2025-05-17 00:36:14.141 [INFO][4990] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" HandleID="k8s-pod-network.57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" Workload="ci--3510.3.7--n--6a88388a60-k8s-goldmane--78d55f7ddc--ktd8c-eth0" May 17 00:36:14.144452 env[1435]: 2025-05-17 00:36:14.142 [INFO][4990] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:14.144452 env[1435]: 2025-05-17 00:36:14.143 [INFO][4983] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d" May 17 00:36:14.145129 env[1435]: time="2025-05-17T00:36:14.144492531Z" level=info msg="TearDown network for sandbox \"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\" successfully" May 17 00:36:14.797675 env[1435]: time="2025-05-17T00:36:14.797617577Z" level=info msg="RemovePodSandbox \"57a900acb2f79382da5cbb86105578f7f863c4cd6077166fa2e4830863d43b2d\" returns successfully" May 17 00:36:14.798774 env[1435]: time="2025-05-17T00:36:14.798519694Z" level=info msg="StopPodSandbox for \"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\"" May 17 00:36:14.867921 env[1435]: 2025-05-17 00:36:14.836 [WARNING][5006] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"238f3626-0d31-4ca4-950c-dfe985793111", ResourceVersion:"1016", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35", Pod:"coredns-674b8bbfcf-ggpwh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.93.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1f4abdcc7aa", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:14.867921 env[1435]: 2025-05-17 00:36:14.836 [INFO][5006] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" May 17 00:36:14.867921 env[1435]: 2025-05-17 00:36:14.836 [INFO][5006] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" iface="eth0" netns="" May 17 00:36:14.867921 env[1435]: 2025-05-17 00:36:14.836 [INFO][5006] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" May 17 00:36:14.867921 env[1435]: 2025-05-17 00:36:14.836 [INFO][5006] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" May 17 00:36:14.867921 env[1435]: 2025-05-17 00:36:14.856 [INFO][5015] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" HandleID="k8s-pod-network.7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0" May 17 00:36:14.867921 env[1435]: 2025-05-17 00:36:14.856 [INFO][5015] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:14.867921 env[1435]: 2025-05-17 00:36:14.856 [INFO][5015] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:14.867921 env[1435]: 2025-05-17 00:36:14.864 [WARNING][5015] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" HandleID="k8s-pod-network.7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0" May 17 00:36:14.867921 env[1435]: 2025-05-17 00:36:14.864 [INFO][5015] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" HandleID="k8s-pod-network.7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0" May 17 00:36:14.867921 env[1435]: 2025-05-17 00:36:14.865 [INFO][5015] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:14.867921 env[1435]: 2025-05-17 00:36:14.866 [INFO][5006] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" May 17 00:36:14.868627 env[1435]: time="2025-05-17T00:36:14.867959728Z" level=info msg="TearDown network for sandbox \"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\" successfully" May 17 00:36:14.868627 env[1435]: time="2025-05-17T00:36:14.867996528Z" level=info msg="StopPodSandbox for \"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\" returns successfully" May 17 00:36:14.868627 env[1435]: time="2025-05-17T00:36:14.868597940Z" level=info msg="RemovePodSandbox for \"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\"" May 17 00:36:14.868751 env[1435]: time="2025-05-17T00:36:14.868638041Z" level=info msg="Forcibly stopping sandbox \"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\"" May 17 00:36:14.932504 env[1435]: 2025-05-17 00:36:14.899 [WARNING][5030] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"238f3626-0d31-4ca4-950c-dfe985793111", ResourceVersion:"1016", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"442e93ce499fdca233327cd40021dfc251b6ed7dd0727846790db2e69cd9ae35", Pod:"coredns-674b8bbfcf-ggpwh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.93.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1f4abdcc7aa", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:14.932504 env[1435]: 2025-05-17 00:36:14.899 [INFO][5030] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" May 17 00:36:14.932504 env[1435]: 2025-05-17 00:36:14.899 [INFO][5030] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" iface="eth0" netns="" May 17 00:36:14.932504 env[1435]: 2025-05-17 00:36:14.899 [INFO][5030] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" May 17 00:36:14.932504 env[1435]: 2025-05-17 00:36:14.899 [INFO][5030] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" May 17 00:36:14.932504 env[1435]: 2025-05-17 00:36:14.921 [INFO][5037] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" HandleID="k8s-pod-network.7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0" May 17 00:36:14.932504 env[1435]: 2025-05-17 00:36:14.921 [INFO][5037] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:14.932504 env[1435]: 2025-05-17 00:36:14.921 [INFO][5037] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:14.932504 env[1435]: 2025-05-17 00:36:14.927 [WARNING][5037] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" HandleID="k8s-pod-network.7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0" May 17 00:36:14.932504 env[1435]: 2025-05-17 00:36:14.927 [INFO][5037] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" HandleID="k8s-pod-network.7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--ggpwh-eth0" May 17 00:36:14.932504 env[1435]: 2025-05-17 00:36:14.930 [INFO][5037] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:14.932504 env[1435]: 2025-05-17 00:36:14.931 [INFO][5030] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0" May 17 00:36:14.933179 env[1435]: time="2025-05-17T00:36:14.932521968Z" level=info msg="TearDown network for sandbox \"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\" successfully" May 17 00:36:15.220000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:15.224834 kernel: kauditd_printk_skb: 186 callbacks suppressed May 17 00:36:15.224932 kernel: audit: type=1400 audit(1747442175.220:1409): avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:15.220000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:15.254841 kernel: audit: type=1400 audit(1747442175.220:1408): avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:15.254931 kernel: audit: type=1300 audit(1747442175.220:1409): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023e3e00 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:36:15.220000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023e3e00 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:36:15.220000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:15.275410 kernel: audit: type=1327 audit(1747442175.220:1409): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:15.220000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:15.291463 kernel: audit: type=1400 audit(1747442175.220:1410): avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:15.220000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc04a0 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:36:15.330283 kernel: audit: type=1300 audit(1747442175.220:1410): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc04a0 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:36:15.330422 kernel: audit: type=1327 audit(1747442175.220:1410): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:15.220000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:15.221000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:15.360889 kernel: audit: type=1400 audit(1747442175.221:1411): avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:36:15.361025 kernel: audit: type=1300 audit(1747442175.221:1411): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc0760 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:36:15.221000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bc0760 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:36:15.221000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:15.400223 kernel: audit: type=1327 audit(1747442175.221:1411): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:15.220000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002566c20 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:36:15.220000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:36:18.395703 env[1435]: time="2025-05-17T00:36:18.395503420Z" level=info msg="RemovePodSandbox \"7fc536eff78b3e0afca64d2c6d0f0511f0e9f090299fae35cee5991ab72221b0\" returns successfully" May 17 00:36:18.396861 env[1435]: time="2025-05-17T00:36:18.396818944Z" level=info msg="StopPodSandbox for \"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\"" May 17 00:36:18.460264 env[1435]: 2025-05-17 00:36:18.428 [WARNING][5053] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"633d4cfc-246e-48fa-a39a-e5371f8453be", ResourceVersion:"1011", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2", Pod:"coredns-674b8bbfcf-6swpt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.93.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieb35e1ee013", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:18.460264 env[1435]: 2025-05-17 00:36:18.429 [INFO][5053] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" May 17 00:36:18.460264 env[1435]: 2025-05-17 00:36:18.429 [INFO][5053] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" iface="eth0" netns="" May 17 00:36:18.460264 env[1435]: 2025-05-17 00:36:18.429 [INFO][5053] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" May 17 00:36:18.460264 env[1435]: 2025-05-17 00:36:18.429 [INFO][5053] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" May 17 00:36:18.460264 env[1435]: 2025-05-17 00:36:18.451 [INFO][5060] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" HandleID="k8s-pod-network.e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0" May 17 00:36:18.460264 env[1435]: 2025-05-17 00:36:18.451 [INFO][5060] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:18.460264 env[1435]: 2025-05-17 00:36:18.451 [INFO][5060] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:18.460264 env[1435]: 2025-05-17 00:36:18.456 [WARNING][5060] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" HandleID="k8s-pod-network.e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0" May 17 00:36:18.460264 env[1435]: 2025-05-17 00:36:18.457 [INFO][5060] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" HandleID="k8s-pod-network.e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0" May 17 00:36:18.460264 env[1435]: 2025-05-17 00:36:18.458 [INFO][5060] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:18.460264 env[1435]: 2025-05-17 00:36:18.459 [INFO][5053] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" May 17 00:36:18.460854 env[1435]: time="2025-05-17T00:36:18.460544493Z" level=info msg="TearDown network for sandbox \"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\" successfully" May 17 00:36:18.460854 env[1435]: time="2025-05-17T00:36:18.460589494Z" level=info msg="StopPodSandbox for \"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\" returns successfully" May 17 00:36:18.461361 env[1435]: time="2025-05-17T00:36:18.461321007Z" level=info msg="RemovePodSandbox for \"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\"" May 17 00:36:18.461502 env[1435]: time="2025-05-17T00:36:18.461363608Z" level=info msg="Forcibly stopping sandbox \"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\"" May 17 00:36:18.533939 env[1435]: 2025-05-17 00:36:18.497 [WARNING][5074] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"633d4cfc-246e-48fa-a39a-e5371f8453be", ResourceVersion:"1011", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"a18a469f4dc6a05a9494e4b9721e256e5b75548ebae3acae27a77ca4bbe27fe2", Pod:"coredns-674b8bbfcf-6swpt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.93.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calieb35e1ee013", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:18.533939 env[1435]: 2025-05-17 00:36:18.498 [INFO][5074] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" May 17 00:36:18.533939 env[1435]: 2025-05-17 00:36:18.498 [INFO][5074] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" iface="eth0" netns="" May 17 00:36:18.533939 env[1435]: 2025-05-17 00:36:18.498 [INFO][5074] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" May 17 00:36:18.533939 env[1435]: 2025-05-17 00:36:18.498 [INFO][5074] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" May 17 00:36:18.533939 env[1435]: 2025-05-17 00:36:18.524 [INFO][5082] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" HandleID="k8s-pod-network.e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0" May 17 00:36:18.533939 env[1435]: 2025-05-17 00:36:18.524 [INFO][5082] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:18.533939 env[1435]: 2025-05-17 00:36:18.524 [INFO][5082] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:18.533939 env[1435]: 2025-05-17 00:36:18.530 [WARNING][5082] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" HandleID="k8s-pod-network.e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0" May 17 00:36:18.533939 env[1435]: 2025-05-17 00:36:18.530 [INFO][5082] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" HandleID="k8s-pod-network.e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" Workload="ci--3510.3.7--n--6a88388a60-k8s-coredns--674b8bbfcf--6swpt-eth0" May 17 00:36:18.533939 env[1435]: 2025-05-17 00:36:18.531 [INFO][5082] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:18.533939 env[1435]: 2025-05-17 00:36:18.532 [INFO][5074] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769" May 17 00:36:18.534625 env[1435]: time="2025-05-17T00:36:18.533962517Z" level=info msg="TearDown network for sandbox \"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\" successfully" May 17 00:36:18.543249 env[1435]: time="2025-05-17T00:36:18.543210484Z" level=info msg="RemovePodSandbox \"e1a9761226b225d920f0e0188b622dd862a7f5f57168616dcb283dba834e4769\" returns successfully" May 17 00:36:18.543797 env[1435]: time="2025-05-17T00:36:18.543748494Z" level=info msg="StopPodSandbox for \"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\"" May 17 00:36:18.606721 env[1435]: 2025-05-17 00:36:18.575 [WARNING][5096] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0", GenerateName:"calico-kube-controllers-5f47758c9f-", Namespace:"calico-system", SelfLink:"", UID:"1c2b527d-d98b-4db0-86b0-f54b67fb605f", ResourceVersion:"1078", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5f47758c9f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938", Pod:"calico-kube-controllers-5f47758c9f-l26k9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.93.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicea31a03268", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:18.606721 env[1435]: 2025-05-17 00:36:18.576 [INFO][5096] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" May 17 00:36:18.606721 env[1435]: 2025-05-17 00:36:18.576 [INFO][5096] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" iface="eth0" netns="" May 17 00:36:18.606721 env[1435]: 2025-05-17 00:36:18.576 [INFO][5096] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" May 17 00:36:18.606721 env[1435]: 2025-05-17 00:36:18.576 [INFO][5096] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" May 17 00:36:18.606721 env[1435]: 2025-05-17 00:36:18.597 [INFO][5103] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" HandleID="k8s-pod-network.51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0" May 17 00:36:18.606721 env[1435]: 2025-05-17 00:36:18.597 [INFO][5103] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:18.606721 env[1435]: 2025-05-17 00:36:18.597 [INFO][5103] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:18.606721 env[1435]: 2025-05-17 00:36:18.603 [WARNING][5103] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" HandleID="k8s-pod-network.51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0" May 17 00:36:18.606721 env[1435]: 2025-05-17 00:36:18.603 [INFO][5103] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" HandleID="k8s-pod-network.51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0" May 17 00:36:18.606721 env[1435]: 2025-05-17 00:36:18.604 [INFO][5103] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:18.606721 env[1435]: 2025-05-17 00:36:18.605 [INFO][5096] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" May 17 00:36:18.607574 env[1435]: time="2025-05-17T00:36:18.606760130Z" level=info msg="TearDown network for sandbox \"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\" successfully" May 17 00:36:18.607574 env[1435]: time="2025-05-17T00:36:18.606798031Z" level=info msg="StopPodSandbox for \"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\" returns successfully" May 17 00:36:18.607574 env[1435]: time="2025-05-17T00:36:18.607419142Z" level=info msg="RemovePodSandbox for \"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\"" May 17 00:36:18.607574 env[1435]: time="2025-05-17T00:36:18.607457443Z" level=info msg="Forcibly stopping sandbox \"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\"" May 17 00:36:18.674240 env[1435]: 2025-05-17 00:36:18.643 [WARNING][5117] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0", GenerateName:"calico-kube-controllers-5f47758c9f-", Namespace:"calico-system", SelfLink:"", UID:"1c2b527d-d98b-4db0-86b0-f54b67fb605f", ResourceVersion:"1078", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5f47758c9f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"7e7819e95c922aad7561052bacb9c2eb564bc3f38585aff0e12b2a0677c01938", Pod:"calico-kube-controllers-5f47758c9f-l26k9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.93.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicea31a03268", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:18.674240 env[1435]: 2025-05-17 00:36:18.643 [INFO][5117] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" May 17 00:36:18.674240 env[1435]: 2025-05-17 00:36:18.643 [INFO][5117] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" iface="eth0" netns="" May 17 00:36:18.674240 env[1435]: 2025-05-17 00:36:18.643 [INFO][5117] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" May 17 00:36:18.674240 env[1435]: 2025-05-17 00:36:18.643 [INFO][5117] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" May 17 00:36:18.674240 env[1435]: 2025-05-17 00:36:18.661 [INFO][5124] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" HandleID="k8s-pod-network.51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0" May 17 00:36:18.674240 env[1435]: 2025-05-17 00:36:18.662 [INFO][5124] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:18.674240 env[1435]: 2025-05-17 00:36:18.662 [INFO][5124] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:18.674240 env[1435]: 2025-05-17 00:36:18.669 [WARNING][5124] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" HandleID="k8s-pod-network.51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0" May 17 00:36:18.674240 env[1435]: 2025-05-17 00:36:18.669 [INFO][5124] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" HandleID="k8s-pod-network.51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--kube--controllers--5f47758c9f--l26k9-eth0" May 17 00:36:18.674240 env[1435]: 2025-05-17 00:36:18.670 [INFO][5124] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:18.674240 env[1435]: 2025-05-17 00:36:18.671 [INFO][5117] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83" May 17 00:36:18.674892 env[1435]: time="2025-05-17T00:36:18.674842258Z" level=info msg="TearDown network for sandbox \"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\" successfully" May 17 00:36:18.682168 env[1435]: time="2025-05-17T00:36:18.682127390Z" level=info msg="RemovePodSandbox \"51ef3821981dfc4f74348b3cb981917eab8fd350596b5be9113cdbe44bce5b83\" returns successfully" May 17 00:36:18.682703 env[1435]: time="2025-05-17T00:36:18.682674900Z" level=info msg="StopPodSandbox for \"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\"" May 17 00:36:18.743490 env[1435]: 2025-05-17 00:36:18.714 [WARNING][5138] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-whisker--7d5bdd5447--s9cpp-eth0" May 17 00:36:18.743490 env[1435]: 2025-05-17 00:36:18.714 [INFO][5138] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" May 17 00:36:18.743490 env[1435]: 2025-05-17 00:36:18.714 [INFO][5138] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" iface="eth0" netns="" May 17 00:36:18.743490 env[1435]: 2025-05-17 00:36:18.714 [INFO][5138] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" May 17 00:36:18.743490 env[1435]: 2025-05-17 00:36:18.714 [INFO][5138] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" May 17 00:36:18.743490 env[1435]: 2025-05-17 00:36:18.733 [INFO][5146] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" HandleID="k8s-pod-network.e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" Workload="ci--3510.3.7--n--6a88388a60-k8s-whisker--7d5bdd5447--s9cpp-eth0" May 17 00:36:18.743490 env[1435]: 2025-05-17 00:36:18.733 [INFO][5146] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:18.743490 env[1435]: 2025-05-17 00:36:18.733 [INFO][5146] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:18.743490 env[1435]: 2025-05-17 00:36:18.740 [WARNING][5146] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" HandleID="k8s-pod-network.e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" Workload="ci--3510.3.7--n--6a88388a60-k8s-whisker--7d5bdd5447--s9cpp-eth0" May 17 00:36:18.743490 env[1435]: 2025-05-17 00:36:18.740 [INFO][5146] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" HandleID="k8s-pod-network.e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" Workload="ci--3510.3.7--n--6a88388a60-k8s-whisker--7d5bdd5447--s9cpp-eth0" May 17 00:36:18.743490 env[1435]: 2025-05-17 00:36:18.741 [INFO][5146] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:18.743490 env[1435]: 2025-05-17 00:36:18.742 [INFO][5138] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" May 17 00:36:18.744077 env[1435]: time="2025-05-17T00:36:18.743539097Z" level=info msg="TearDown network for sandbox \"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\" successfully" May 17 00:36:18.744077 env[1435]: time="2025-05-17T00:36:18.743577498Z" level=info msg="StopPodSandbox for \"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\" returns successfully" May 17 00:36:18.744200 env[1435]: time="2025-05-17T00:36:18.744170609Z" level=info msg="RemovePodSandbox for \"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\"" May 17 00:36:18.744267 env[1435]: time="2025-05-17T00:36:18.744214610Z" level=info msg="Forcibly stopping sandbox \"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\"" May 17 00:36:18.817822 env[1435]: 2025-05-17 00:36:18.780 [WARNING][5160] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" WorkloadEndpoint="ci--3510.3.7--n--6a88388a60-k8s-whisker--7d5bdd5447--s9cpp-eth0" May 17 00:36:18.817822 env[1435]: 2025-05-17 00:36:18.780 [INFO][5160] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" May 17 00:36:18.817822 env[1435]: 2025-05-17 00:36:18.780 [INFO][5160] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" iface="eth0" netns="" May 17 00:36:18.817822 env[1435]: 2025-05-17 00:36:18.780 [INFO][5160] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" May 17 00:36:18.817822 env[1435]: 2025-05-17 00:36:18.780 [INFO][5160] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" May 17 00:36:18.817822 env[1435]: 2025-05-17 00:36:18.808 [INFO][5167] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" HandleID="k8s-pod-network.e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" Workload="ci--3510.3.7--n--6a88388a60-k8s-whisker--7d5bdd5447--s9cpp-eth0" May 17 00:36:18.817822 env[1435]: 2025-05-17 00:36:18.809 [INFO][5167] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:18.817822 env[1435]: 2025-05-17 00:36:18.809 [INFO][5167] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:18.817822 env[1435]: 2025-05-17 00:36:18.814 [WARNING][5167] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" HandleID="k8s-pod-network.e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" Workload="ci--3510.3.7--n--6a88388a60-k8s-whisker--7d5bdd5447--s9cpp-eth0" May 17 00:36:18.817822 env[1435]: 2025-05-17 00:36:18.814 [INFO][5167] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" HandleID="k8s-pod-network.e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" Workload="ci--3510.3.7--n--6a88388a60-k8s-whisker--7d5bdd5447--s9cpp-eth0" May 17 00:36:18.817822 env[1435]: 2025-05-17 00:36:18.815 [INFO][5167] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:18.817822 env[1435]: 2025-05-17 00:36:18.816 [INFO][5160] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a" May 17 00:36:18.818419 env[1435]: time="2025-05-17T00:36:18.817853538Z" level=info msg="TearDown network for sandbox \"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\" successfully" May 17 00:36:18.827969 env[1435]: time="2025-05-17T00:36:18.827930220Z" level=info msg="RemovePodSandbox \"e5648f7431c358e4e3d64cc0fd84346a5b131ce61787561064a3b127f322700a\" returns successfully" May 17 00:36:18.828504 env[1435]: time="2025-05-17T00:36:18.828469729Z" level=info msg="StopPodSandbox for \"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\"" May 17 00:36:18.902119 env[1435]: 2025-05-17 00:36:18.860 [WARNING][5183] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0", GenerateName:"calico-apiserver-7664dbdf7c-", Namespace:"calico-apiserver", SelfLink:"", UID:"68bd3f92-8819-482c-a4dc-243b1c1b6b66", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7664dbdf7c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df", Pod:"calico-apiserver-7664dbdf7c-5c5jt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.93.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali439b28ae29e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:18.902119 env[1435]: 2025-05-17 00:36:18.860 [INFO][5183] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" May 17 00:36:18.902119 env[1435]: 2025-05-17 00:36:18.860 [INFO][5183] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" iface="eth0" netns="" May 17 00:36:18.902119 env[1435]: 2025-05-17 00:36:18.860 [INFO][5183] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" May 17 00:36:18.902119 env[1435]: 2025-05-17 00:36:18.860 [INFO][5183] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" May 17 00:36:18.902119 env[1435]: 2025-05-17 00:36:18.888 [INFO][5190] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" HandleID="k8s-pod-network.e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0" May 17 00:36:18.902119 env[1435]: 2025-05-17 00:36:18.888 [INFO][5190] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:18.902119 env[1435]: 2025-05-17 00:36:18.888 [INFO][5190] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:18.902119 env[1435]: 2025-05-17 00:36:18.898 [WARNING][5190] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" HandleID="k8s-pod-network.e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0" May 17 00:36:18.902119 env[1435]: 2025-05-17 00:36:18.898 [INFO][5190] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" HandleID="k8s-pod-network.e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0" May 17 00:36:18.902119 env[1435]: 2025-05-17 00:36:18.900 [INFO][5190] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:18.902119 env[1435]: 2025-05-17 00:36:18.901 [INFO][5183] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" May 17 00:36:18.902994 env[1435]: time="2025-05-17T00:36:18.902150958Z" level=info msg="TearDown network for sandbox \"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\" successfully" May 17 00:36:18.902994 env[1435]: time="2025-05-17T00:36:18.902189359Z" level=info msg="StopPodSandbox for \"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\" returns successfully" May 17 00:36:18.903256 env[1435]: time="2025-05-17T00:36:18.903221478Z" level=info msg="RemovePodSandbox for \"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\"" May 17 00:36:18.903349 env[1435]: time="2025-05-17T00:36:18.903258278Z" level=info msg="Forcibly stopping sandbox \"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\"" May 17 00:36:18.979088 env[1435]: 2025-05-17 00:36:18.946 [WARNING][5208] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0", GenerateName:"calico-apiserver-7664dbdf7c-", Namespace:"calico-apiserver", SelfLink:"", UID:"68bd3f92-8819-482c-a4dc-243b1c1b6b66", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7664dbdf7c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"ceccf24f19079b7a73314fdea44ab55eb5cc80e285d3500f80842819a9e440df", Pod:"calico-apiserver-7664dbdf7c-5c5jt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.93.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali439b28ae29e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:18.979088 env[1435]: 2025-05-17 00:36:18.947 [INFO][5208] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" May 17 00:36:18.979088 env[1435]: 2025-05-17 00:36:18.947 [INFO][5208] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" iface="eth0" netns="" May 17 00:36:18.979088 env[1435]: 2025-05-17 00:36:18.947 [INFO][5208] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" May 17 00:36:18.979088 env[1435]: 2025-05-17 00:36:18.947 [INFO][5208] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" May 17 00:36:18.979088 env[1435]: 2025-05-17 00:36:18.967 [INFO][5215] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" HandleID="k8s-pod-network.e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0" May 17 00:36:18.979088 env[1435]: 2025-05-17 00:36:18.967 [INFO][5215] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:18.979088 env[1435]: 2025-05-17 00:36:18.968 [INFO][5215] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:18.979088 env[1435]: 2025-05-17 00:36:18.975 [WARNING][5215] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" HandleID="k8s-pod-network.e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0" May 17 00:36:18.979088 env[1435]: 2025-05-17 00:36:18.975 [INFO][5215] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" HandleID="k8s-pod-network.e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5c5jt-eth0" May 17 00:36:18.979088 env[1435]: 2025-05-17 00:36:18.976 [INFO][5215] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:18.979088 env[1435]: 2025-05-17 00:36:18.977 [INFO][5208] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea" May 17 00:36:18.979791 env[1435]: time="2025-05-17T00:36:18.979126547Z" level=info msg="TearDown network for sandbox \"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\" successfully" May 17 00:36:18.993458 env[1435]: time="2025-05-17T00:36:18.991062862Z" level=info msg="RemovePodSandbox \"e4b338229e61b4a2cf9e106a4a43f9b01cdf2275e60aa6cbb656d1852dc833ea\" returns successfully" May 17 00:36:18.993458 env[1435]: time="2025-05-17T00:36:18.991611072Z" level=info msg="StopPodSandbox for \"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\"" May 17 00:36:19.060969 env[1435]: 2025-05-17 00:36:19.026 [WARNING][5230] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"15b079d6-0080-4890-bd00-77adf92b4b29", ResourceVersion:"1087", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77", Pod:"csi-node-driver-wk56l", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.93.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali67056fa57aa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:19.060969 env[1435]: 2025-05-17 00:36:19.027 [INFO][5230] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" May 17 00:36:19.060969 env[1435]: 2025-05-17 00:36:19.027 [INFO][5230] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" iface="eth0" netns="" May 17 00:36:19.060969 env[1435]: 2025-05-17 00:36:19.027 [INFO][5230] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" May 17 00:36:19.060969 env[1435]: 2025-05-17 00:36:19.027 [INFO][5230] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" May 17 00:36:19.060969 env[1435]: 2025-05-17 00:36:19.051 [INFO][5238] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" HandleID="k8s-pod-network.68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" Workload="ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0" May 17 00:36:19.060969 env[1435]: 2025-05-17 00:36:19.051 [INFO][5238] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:19.060969 env[1435]: 2025-05-17 00:36:19.052 [INFO][5238] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:19.060969 env[1435]: 2025-05-17 00:36:19.057 [WARNING][5238] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" HandleID="k8s-pod-network.68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" Workload="ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0" May 17 00:36:19.060969 env[1435]: 2025-05-17 00:36:19.057 [INFO][5238] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" HandleID="k8s-pod-network.68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" Workload="ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0" May 17 00:36:19.060969 env[1435]: 2025-05-17 00:36:19.058 [INFO][5238] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:19.060969 env[1435]: 2025-05-17 00:36:19.059 [INFO][5230] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" May 17 00:36:19.061537 env[1435]: time="2025-05-17T00:36:19.061011407Z" level=info msg="TearDown network for sandbox \"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\" successfully" May 17 00:36:19.061537 env[1435]: time="2025-05-17T00:36:19.061048008Z" level=info msg="StopPodSandbox for \"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\" returns successfully" May 17 00:36:19.062096 env[1435]: time="2025-05-17T00:36:19.062057726Z" level=info msg="RemovePodSandbox for \"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\"" May 17 00:36:19.062216 env[1435]: time="2025-05-17T00:36:19.062098026Z" level=info msg="Forcibly stopping sandbox \"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\"" May 17 00:36:19.128570 env[1435]: 2025-05-17 00:36:19.096 [WARNING][5252] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"15b079d6-0080-4890-bd00-77adf92b4b29", ResourceVersion:"1087", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"7fd30f792975e10d3e010aead678d650e97f0af7020f4b77fa1b9285e526cb77", Pod:"csi-node-driver-wk56l", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.93.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali67056fa57aa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:19.128570 env[1435]: 2025-05-17 00:36:19.097 [INFO][5252] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" May 17 00:36:19.128570 env[1435]: 2025-05-17 00:36:19.097 [INFO][5252] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" iface="eth0" netns="" May 17 00:36:19.128570 env[1435]: 2025-05-17 00:36:19.097 [INFO][5252] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" May 17 00:36:19.128570 env[1435]: 2025-05-17 00:36:19.097 [INFO][5252] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" May 17 00:36:19.128570 env[1435]: 2025-05-17 00:36:19.118 [INFO][5259] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" HandleID="k8s-pod-network.68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" Workload="ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0" May 17 00:36:19.128570 env[1435]: 2025-05-17 00:36:19.118 [INFO][5259] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:19.128570 env[1435]: 2025-05-17 00:36:19.118 [INFO][5259] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:19.128570 env[1435]: 2025-05-17 00:36:19.124 [WARNING][5259] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" HandleID="k8s-pod-network.68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" Workload="ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0" May 17 00:36:19.128570 env[1435]: 2025-05-17 00:36:19.124 [INFO][5259] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" HandleID="k8s-pod-network.68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" Workload="ci--3510.3.7--n--6a88388a60-k8s-csi--node--driver--wk56l-eth0" May 17 00:36:19.128570 env[1435]: 2025-05-17 00:36:19.126 [INFO][5259] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:19.128570 env[1435]: 2025-05-17 00:36:19.127 [INFO][5252] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b" May 17 00:36:19.129235 env[1435]: time="2025-05-17T00:36:19.128593908Z" level=info msg="TearDown network for sandbox \"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\" successfully" May 17 00:36:19.140251 env[1435]: time="2025-05-17T00:36:19.140206214Z" level=info msg="RemovePodSandbox \"68c8d57adf8ba09981c16c5d8ce3c09b4ac2f80172e226c7c25340df72bb972b\" returns successfully" May 17 00:36:19.140807 env[1435]: time="2025-05-17T00:36:19.140776624Z" level=info msg="StopPodSandbox for \"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\"" May 17 00:36:19.205210 env[1435]: 2025-05-17 00:36:19.173 [WARNING][5273] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0", GenerateName:"calico-apiserver-7664dbdf7c-", Namespace:"calico-apiserver", SelfLink:"", UID:"245c2865-77c9-4af3-afa1-058bc899e239", ResourceVersion:"1067", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7664dbdf7c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66", Pod:"calico-apiserver-7664dbdf7c-5265z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.93.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0ce7dba7936", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:19.205210 env[1435]: 2025-05-17 00:36:19.173 [INFO][5273] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" May 17 00:36:19.205210 env[1435]: 2025-05-17 00:36:19.173 [INFO][5273] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" iface="eth0" netns="" May 17 00:36:19.205210 env[1435]: 2025-05-17 00:36:19.173 [INFO][5273] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" May 17 00:36:19.205210 env[1435]: 2025-05-17 00:36:19.173 [INFO][5273] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" May 17 00:36:19.205210 env[1435]: 2025-05-17 00:36:19.193 [INFO][5280] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" HandleID="k8s-pod-network.80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0" May 17 00:36:19.205210 env[1435]: 2025-05-17 00:36:19.194 [INFO][5280] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:19.205210 env[1435]: 2025-05-17 00:36:19.194 [INFO][5280] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:19.205210 env[1435]: 2025-05-17 00:36:19.201 [WARNING][5280] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" HandleID="k8s-pod-network.80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0" May 17 00:36:19.205210 env[1435]: 2025-05-17 00:36:19.201 [INFO][5280] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" HandleID="k8s-pod-network.80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0" May 17 00:36:19.205210 env[1435]: 2025-05-17 00:36:19.203 [INFO][5280] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:19.205210 env[1435]: 2025-05-17 00:36:19.204 [INFO][5273] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" May 17 00:36:19.205868 env[1435]: time="2025-05-17T00:36:19.205831580Z" level=info msg="TearDown network for sandbox \"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\" successfully" May 17 00:36:19.205936 env[1435]: time="2025-05-17T00:36:19.205922582Z" level=info msg="StopPodSandbox for \"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\" returns successfully" May 17 00:36:19.206568 env[1435]: time="2025-05-17T00:36:19.206544593Z" level=info msg="RemovePodSandbox for \"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\"" May 17 00:36:19.206818 env[1435]: time="2025-05-17T00:36:19.206719796Z" level=info msg="Forcibly stopping sandbox \"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\"" May 17 00:36:19.272426 env[1435]: 2025-05-17 00:36:19.238 [WARNING][5295] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0", GenerateName:"calico-apiserver-7664dbdf7c-", Namespace:"calico-apiserver", SelfLink:"", UID:"245c2865-77c9-4af3-afa1-058bc899e239", ResourceVersion:"1067", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 35, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7664dbdf7c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-6a88388a60", ContainerID:"fa077b14caa7a445b1fce1d2b818850acd931cd69b36d6bb237fd647f47f5b66", Pod:"calico-apiserver-7664dbdf7c-5265z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.93.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0ce7dba7936", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:36:19.272426 env[1435]: 2025-05-17 00:36:19.238 [INFO][5295] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" May 17 00:36:19.272426 env[1435]: 2025-05-17 00:36:19.238 [INFO][5295] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" iface="eth0" netns="" May 17 00:36:19.272426 env[1435]: 2025-05-17 00:36:19.238 [INFO][5295] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" May 17 00:36:19.272426 env[1435]: 2025-05-17 00:36:19.238 [INFO][5295] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" May 17 00:36:19.272426 env[1435]: 2025-05-17 00:36:19.260 [INFO][5302] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" HandleID="k8s-pod-network.80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0" May 17 00:36:19.272426 env[1435]: 2025-05-17 00:36:19.260 [INFO][5302] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:36:19.272426 env[1435]: 2025-05-17 00:36:19.260 [INFO][5302] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:36:19.272426 env[1435]: 2025-05-17 00:36:19.266 [WARNING][5302] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" HandleID="k8s-pod-network.80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0" May 17 00:36:19.272426 env[1435]: 2025-05-17 00:36:19.266 [INFO][5302] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" HandleID="k8s-pod-network.80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" Workload="ci--3510.3.7--n--6a88388a60-k8s-calico--apiserver--7664dbdf7c--5265z-eth0" May 17 00:36:19.272426 env[1435]: 2025-05-17 00:36:19.267 [INFO][5302] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:36:19.272426 env[1435]: 2025-05-17 00:36:19.269 [INFO][5295] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e" May 17 00:36:19.272426 env[1435]: time="2025-05-17T00:36:19.270366526Z" level=info msg="TearDown network for sandbox \"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\" successfully" May 17 00:36:19.281080 env[1435]: time="2025-05-17T00:36:19.281039616Z" level=info msg="RemovePodSandbox \"80ad9ee4f7b15e6dad0bf4cbc19a997c36139308e6b02998e7e24d1927ef580e\" returns successfully" May 17 00:36:20.973699 env[1435]: time="2025-05-17T00:36:20.973634831Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:36:21.161512 env[1435]: time="2025-05-17T00:36:21.161427678Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:36:21.165129 env[1435]: time="2025-05-17T00:36:21.165057940Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:36:21.165476 kubelet[2423]: E0517 00:36:21.165427 2423 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:36:21.165970 kubelet[2423]: E0517 00:36:21.165494 2423 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:36:21.165970 kubelet[2423]: E0517 00:36:21.165716 2423 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-nl5jn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-ktd8c_calico-system(90fc490d-b68e-41e0-a777-9015e6ba2a3c): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:36:21.167418 kubelet[2423]: E0517 00:36:21.167362 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-ktd8c" podUID="90fc490d-b68e-41e0-a777-9015e6ba2a3c" May 17 00:36:23.974489 kubelet[2423]: E0517 00:36:23.974434 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6564c697ff-q65rf" podUID="403007e9-af7a-4a5d-9b90-5920611d9175" May 17 00:36:27.198706 systemd[1]: run-containerd-runc-k8s.io-2bbbf50bb8c3bd88e77ea36cc9196c673ace3e9922b22d9b12e7c2e3c0f9e4a7-runc.UqJfxk.mount: Deactivated successfully. May 17 00:36:28.909594 kubelet[2423]: I0517 00:36:28.909550 2423 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:36:28.957000 audit[5337]: NETFILTER_CFG table=filter:129 family=2 entries=13 op=nft_register_rule pid=5337 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:28.963010 kernel: kauditd_printk_skb: 2 callbacks suppressed May 17 00:36:28.963129 kernel: audit: type=1325 audit(1747442188.957:1412): table=filter:129 family=2 entries=13 op=nft_register_rule pid=5337 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:28.957000 audit[5337]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe309c6d40 a2=0 a3=7ffe309c6d2c items=0 ppid=2559 pid=5337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:28.991462 kernel: audit: type=1300 audit(1747442188.957:1412): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe309c6d40 a2=0 a3=7ffe309c6d2c items=0 ppid=2559 pid=5337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:28.991602 kernel: audit: type=1327 audit(1747442188.957:1412): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:28.957000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:28.993000 audit[5337]: NETFILTER_CFG table=nat:130 family=2 entries=27 op=nft_register_chain pid=5337 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:29.010686 kernel: audit: type=1325 audit(1747442188.993:1413): table=nat:130 family=2 entries=27 op=nft_register_chain pid=5337 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:29.010807 kernel: audit: type=1300 audit(1747442188.993:1413): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe309c6d40 a2=0 a3=7ffe309c6d2c items=0 ppid=2559 pid=5337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:28.993000 audit[5337]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe309c6d40 a2=0 a3=7ffe309c6d2c items=0 ppid=2559 pid=5337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:29.037466 kernel: audit: type=1327 audit(1747442188.993:1413): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:28.993000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:35.972703 kubelet[2423]: E0517 00:36:35.972309 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-ktd8c" podUID="90fc490d-b68e-41e0-a777-9015e6ba2a3c" May 17 00:36:36.972741 env[1435]: time="2025-05-17T00:36:36.972407073Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:36:37.183411 env[1435]: time="2025-05-17T00:36:37.183334454Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:36:37.188463 env[1435]: time="2025-05-17T00:36:37.188384525Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:36:37.188901 kubelet[2423]: E0517 00:36:37.188864 2423 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:36:37.189268 kubelet[2423]: E0517 00:36:37.188919 2423 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:36:37.189268 kubelet[2423]: E0517 00:36:37.189067 2423 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:f4c4fa38b65b452f8870b25fcd45b50b,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-h5d82,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6564c697ff-q65rf_calico-system(403007e9-af7a-4a5d-9b90-5920611d9175): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:36:37.191544 env[1435]: time="2025-05-17T00:36:37.191512570Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:36:37.367591 env[1435]: time="2025-05-17T00:36:37.367439853Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:36:37.371362 env[1435]: time="2025-05-17T00:36:37.371301207Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:36:37.371603 kubelet[2423]: E0517 00:36:37.371562 2423 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:36:37.371704 kubelet[2423]: E0517 00:36:37.371629 2423 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:36:37.371836 kubelet[2423]: E0517 00:36:37.371796 2423 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-h5d82,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6564c697ff-q65rf_calico-system(403007e9-af7a-4a5d-9b90-5920611d9175): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:36:37.373053 kubelet[2423]: E0517 00:36:37.373008 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6564c697ff-q65rf" podUID="403007e9-af7a-4a5d-9b90-5920611d9175" May 17 00:36:40.686782 kubelet[2423]: I0517 00:36:40.686673 2423 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:36:40.845000 audit[5347]: NETFILTER_CFG table=filter:131 family=2 entries=12 op=nft_register_rule pid=5347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:40.845000 audit[5347]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd1dfde6f0 a2=0 a3=7ffd1dfde6dc items=0 ppid=2559 pid=5347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.878264 kernel: audit: type=1325 audit(1747442200.845:1414): table=filter:131 family=2 entries=12 op=nft_register_rule pid=5347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:40.878421 kernel: audit: type=1300 audit(1747442200.845:1414): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd1dfde6f0 a2=0 a3=7ffd1dfde6dc items=0 ppid=2559 pid=5347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.845000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:40.889436 kernel: audit: type=1327 audit(1747442200.845:1414): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:40.888000 audit[5347]: NETFILTER_CFG table=nat:132 family=2 entries=34 op=nft_register_chain pid=5347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:40.888000 audit[5347]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd1dfde6f0 a2=0 a3=7ffd1dfde6dc items=0 ppid=2559 pid=5347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.918100 kernel: audit: type=1325 audit(1747442200.888:1415): table=nat:132 family=2 entries=34 op=nft_register_chain pid=5347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:36:40.918239 kernel: audit: type=1300 audit(1747442200.888:1415): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd1dfde6f0 a2=0 a3=7ffd1dfde6dc items=0 ppid=2559 pid=5347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:36:40.888000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:40.928416 kernel: audit: type=1327 audit(1747442200.888:1415): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:36:41.324432 systemd[1]: run-containerd-runc-k8s.io-2c17f355c1d42e08a0b7154544a8c6b9372d0fdc8628bfaec097d6fe2cbbdf8b-runc.7FUUVT.mount: Deactivated successfully. May 17 00:36:48.973038 env[1435]: time="2025-05-17T00:36:48.972980370Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:36:49.169139 env[1435]: time="2025-05-17T00:36:49.169074347Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:36:49.172622 env[1435]: time="2025-05-17T00:36:49.172568891Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:36:49.172893 kubelet[2423]: E0517 00:36:49.172838 2423 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:36:49.173281 kubelet[2423]: E0517 00:36:49.172906 2423 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:36:49.173281 kubelet[2423]: E0517 00:36:49.173089 2423 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-nl5jn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-ktd8c_calico-system(90fc490d-b68e-41e0-a777-9015e6ba2a3c): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:36:49.175025 kubelet[2423]: E0517 00:36:49.174930 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-ktd8c" podUID="90fc490d-b68e-41e0-a777-9015e6ba2a3c" May 17 00:36:49.975711 kubelet[2423]: E0517 00:36:49.975664 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6564c697ff-q65rf" podUID="403007e9-af7a-4a5d-9b90-5920611d9175" May 17 00:36:57.197126 systemd[1]: run-containerd-runc-k8s.io-2bbbf50bb8c3bd88e77ea36cc9196c673ace3e9922b22d9b12e7c2e3c0f9e4a7-runc.7SRR0h.mount: Deactivated successfully. May 17 00:37:03.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.4.40:22-10.200.16.10:49162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:03.291052 systemd[1]: Started sshd@7-10.200.4.40:22-10.200.16.10:49162.service. May 17 00:37:03.309601 kernel: audit: type=1130 audit(1747442223.289:1416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.4.40:22-10.200.16.10:49162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:03.895934 sshd[5400]: Accepted publickey for core from 10.200.16.10 port 49162 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:37:03.894000 audit[5400]: USER_ACCT pid=5400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:03.916482 kernel: audit: type=1101 audit(1747442223.894:1417): pid=5400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:03.917437 sshd[5400]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:03.923788 systemd[1]: Started session-10.scope. May 17 00:37:03.925474 systemd-logind[1425]: New session 10 of user core. May 17 00:37:03.915000 audit[5400]: CRED_ACQ pid=5400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:03.950408 kernel: audit: type=1103 audit(1747442223.915:1418): pid=5400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:03.982977 kernel: audit: type=1006 audit(1747442223.915:1419): pid=5400 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 17 00:37:03.983097 kernel: audit: type=1300 audit(1747442223.915:1419): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff87aedc20 a2=3 a3=0 items=0 ppid=1 pid=5400 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:03.915000 audit[5400]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff87aedc20 a2=3 a3=0 items=0 ppid=1 pid=5400 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:03.915000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:37:03.990330 kubelet[2423]: E0517 00:37:03.984181 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-ktd8c" podUID="90fc490d-b68e-41e0-a777-9015e6ba2a3c" May 17 00:37:03.990755 kernel: audit: type=1327 audit(1747442223.915:1419): proctitle=737368643A20636F7265205B707269765D May 17 00:37:03.929000 audit[5400]: USER_START pid=5400 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:03.948000 audit[5402]: CRED_ACQ pid=5402 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:04.024253 kernel: audit: type=1105 audit(1747442223.929:1420): pid=5400 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:04.024354 kernel: audit: type=1103 audit(1747442223.948:1421): pid=5402 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:04.444406 sshd[5400]: pam_unix(sshd:session): session closed for user core May 17 00:37:04.444000 audit[5400]: USER_END pid=5400 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:04.466463 kernel: audit: type=1106 audit(1747442224.444:1422): pid=5400 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:04.469286 systemd[1]: sshd@7-10.200.4.40:22-10.200.16.10:49162.service: Deactivated successfully. May 17 00:37:04.470379 systemd[1]: session-10.scope: Deactivated successfully. May 17 00:37:04.471133 systemd-logind[1425]: Session 10 logged out. Waiting for processes to exit. May 17 00:37:04.472266 systemd-logind[1425]: Removed session 10. May 17 00:37:04.466000 audit[5400]: CRED_DISP pid=5400 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:04.495409 kernel: audit: type=1104 audit(1747442224.466:1423): pid=5400 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:04.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.4.40:22-10.200.16.10:49162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.848000 audit[4728]: AVC avc: denied { watch } for pid=4728 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_35_46.4159674763/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c286,c954 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c286,c954 tclass=file permissive=0 May 17 00:37:04.848000 audit[4728]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f5aec0 a2=fc6 a3=0 items=0 ppid=3997 pid=4728 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c286,c954 key=(null) May 17 00:37:04.848000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:37:04.973565 kubelet[2423]: E0517 00:37:04.973481 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6564c697ff-q65rf" podUID="403007e9-af7a-4a5d-9b90-5920611d9175" May 17 00:37:09.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.4.40:22-10.200.16.10:39518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.542971 systemd[1]: Started sshd@8-10.200.4.40:22-10.200.16.10:39518.service. May 17 00:37:09.548792 kernel: kauditd_printk_skb: 4 callbacks suppressed May 17 00:37:09.548883 kernel: audit: type=1130 audit(1747442229.541:1426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.4.40:22-10.200.16.10:39518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.755000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:09.774411 kernel: audit: type=1400 audit(1747442229.755:1427): avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:09.757000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:09.796405 kernel: audit: type=1400 audit(1747442229.757:1428): avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:09.796530 kernel: audit: type=1300 audit(1747442229.757:1428): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002fa62c0 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:37:09.757000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002fa62c0 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:37:09.757000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:09.838453 kernel: audit: type=1327 audit(1747442229.757:1428): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:09.755000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002406ea0 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:37:09.755000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:09.876167 kernel: audit: type=1300 audit(1747442229.755:1427): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002406ea0 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:37:09.876305 kernel: audit: type=1327 audit(1747442229.755:1427): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:10.137869 sshd[5414]: Accepted publickey for core from 10.200.16.10 port 39518 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:37:10.139636 sshd[5414]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:10.136000 audit[5414]: USER_ACCT pid=5414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:10.158422 kernel: audit: type=1101 audit(1747442230.136:1429): pid=5414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:10.137000 audit[5414]: CRED_ACQ pid=5414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:10.163233 systemd-logind[1425]: New session 11 of user core. May 17 00:37:10.186006 kernel: audit: type=1103 audit(1747442230.137:1430): pid=5414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:10.186054 kernel: audit: type=1006 audit(1747442230.137:1431): pid=5414 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 17 00:37:10.186672 systemd[1]: Started session-11.scope. May 17 00:37:10.137000 audit[5414]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa9290fc0 a2=3 a3=0 items=0 ppid=1 pid=5414 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:10.137000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:37:10.193000 audit[5414]: USER_START pid=5414 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:10.195000 audit[5416]: CRED_ACQ pid=5416 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:10.702184 sshd[5414]: pam_unix(sshd:session): session closed for user core May 17 00:37:10.702000 audit[5414]: USER_END pid=5414 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:10.702000 audit[5414]: CRED_DISP pid=5414 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:10.706719 systemd-logind[1425]: Session 11 logged out. Waiting for processes to exit. May 17 00:37:10.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.4.40:22-10.200.16.10:39518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:10.708279 systemd[1]: sshd@8-10.200.4.40:22-10.200.16.10:39518.service: Deactivated successfully. May 17 00:37:10.709231 systemd[1]: session-11.scope: Deactivated successfully. May 17 00:37:10.711311 systemd-logind[1425]: Removed session 11. May 17 00:37:11.017000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:11.017000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c01341a870 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:37:11.017000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:37:11.018000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=5267 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:11.018000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c01341ac90 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:37:11.018000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:37:11.019000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:11.019000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c013cd3520 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:37:11.019000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:37:11.034000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=5273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:11.034000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c0081c46f0 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:37:11.034000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:37:11.107000 audit[4867]: AVC avc: denied { watch } for pid=4867 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_35_46.4068466090/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c726,c765 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c726,c765 tclass=file permissive=0 May 17 00:37:11.107000 audit[4867]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000eb9d00 a2=fc6 a3=0 items=0 ppid=4631 pid=4867 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c726,c765 key=(null) May 17 00:37:11.107000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:37:11.126000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:11.126000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:11.126000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c008552240 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:37:11.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:37:11.126000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c0121b81e0 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:37:11.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:37:11.318370 systemd[1]: run-containerd-runc-k8s.io-2c17f355c1d42e08a0b7154544a8c6b9372d0fdc8628bfaec097d6fe2cbbdf8b-runc.lTmEZj.mount: Deactivated successfully. May 17 00:37:15.243613 kernel: kauditd_printk_skb: 28 callbacks suppressed May 17 00:37:15.243804 kernel: audit: type=1400 audit(1747442235.220:1444): avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:15.220000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:15.243000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:15.243000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002fa7180 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:37:15.287853 kernel: audit: type=1400 audit(1747442235.243:1445): avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:15.287985 kernel: audit: type=1300 audit(1747442235.243:1445): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002fa7180 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:37:15.243000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:15.308420 kernel: audit: type=1327 audit(1747442235.243:1445): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:15.244000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:15.333412 kernel: audit: type=1400 audit(1747442235.244:1446): avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:15.244000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002fa74a0 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:37:15.362408 kernel: audit: type=1300 audit(1747442235.244:1446): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002fa74a0 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:37:15.244000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:15.244000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:15.401308 kernel: audit: type=1327 audit(1747442235.244:1446): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:15.401432 kernel: audit: type=1400 audit(1747442235.244:1447): avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:37:15.401468 kernel: audit: type=1300 audit(1747442235.244:1447): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002fa74c0 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:37:15.244000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002fa74c0 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:37:15.244000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:15.441457 kernel: audit: type=1327 audit(1747442235.244:1447): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:15.220000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c003148060 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:37:15.220000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:37:15.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.4.40:22-10.200.16.10:39522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.801016 systemd[1]: Started sshd@9-10.200.4.40:22-10.200.16.10:39522.service. May 17 00:37:15.972496 kubelet[2423]: E0517 00:37:15.972446 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-ktd8c" podUID="90fc490d-b68e-41e0-a777-9015e6ba2a3c" May 17 00:37:16.391000 audit[5449]: USER_ACCT pid=5449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:16.391752 sshd[5449]: Accepted publickey for core from 10.200.16.10 port 39522 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:37:16.392000 audit[5449]: CRED_ACQ pid=5449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:16.392000 audit[5449]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbda118c0 a2=3 a3=0 items=0 ppid=1 pid=5449 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:16.392000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:37:16.393139 sshd[5449]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:16.397949 systemd-logind[1425]: New session 12 of user core. May 17 00:37:16.398448 systemd[1]: Started session-12.scope. May 17 00:37:16.403000 audit[5449]: USER_START pid=5449 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:16.405000 audit[5451]: CRED_ACQ pid=5451 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:16.939234 sshd[5449]: pam_unix(sshd:session): session closed for user core May 17 00:37:16.940000 audit[5449]: USER_END pid=5449 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:16.940000 audit[5449]: CRED_DISP pid=5449 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:16.942732 systemd[1]: sshd@9-10.200.4.40:22-10.200.16.10:39522.service: Deactivated successfully. May 17 00:37:16.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.4.40:22-10.200.16.10:39522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:16.943770 systemd[1]: session-12.scope: Deactivated successfully. May 17 00:37:16.944535 systemd-logind[1425]: Session 12 logged out. Waiting for processes to exit. May 17 00:37:16.945621 systemd-logind[1425]: Removed session 12. May 17 00:37:18.972622 env[1435]: time="2025-05-17T00:37:18.972260893Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:37:19.148632 env[1435]: time="2025-05-17T00:37:19.148552750Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:37:19.152485 env[1435]: time="2025-05-17T00:37:19.152426345Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:37:19.152776 kubelet[2423]: E0517 00:37:19.152727 2423 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:37:19.153219 kubelet[2423]: E0517 00:37:19.152808 2423 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:37:19.153585 kubelet[2423]: E0517 00:37:19.153524 2423 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:f4c4fa38b65b452f8870b25fcd45b50b,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-h5d82,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6564c697ff-q65rf_calico-system(403007e9-af7a-4a5d-9b90-5920611d9175): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:37:19.156244 env[1435]: time="2025-05-17T00:37:19.155948440Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:37:19.342359 env[1435]: time="2025-05-17T00:37:19.342192572Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:37:19.351527 env[1435]: time="2025-05-17T00:37:19.351465159Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:37:19.351804 kubelet[2423]: E0517 00:37:19.351757 2423 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:37:19.351907 kubelet[2423]: E0517 00:37:19.351823 2423 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:37:19.352012 kubelet[2423]: E0517 00:37:19.351973 2423 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-h5d82,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6564c697ff-q65rf_calico-system(403007e9-af7a-4a5d-9b90-5920611d9175): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:37:19.353578 kubelet[2423]: E0517 00:37:19.353540 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6564c697ff-q65rf" podUID="403007e9-af7a-4a5d-9b90-5920611d9175" May 17 00:37:22.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.4.40:22-10.200.16.10:41080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:22.041361 systemd[1]: Started sshd@10-10.200.4.40:22-10.200.16.10:41080.service. May 17 00:37:22.046318 kernel: kauditd_printk_skb: 13 callbacks suppressed May 17 00:37:22.046427 kernel: audit: type=1130 audit(1747442242.041:1457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.4.40:22-10.200.16.10:41080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:22.630000 audit[5488]: USER_ACCT pid=5488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:22.630970 sshd[5488]: Accepted publickey for core from 10.200.16.10 port 41080 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:37:22.648000 audit[5488]: CRED_ACQ pid=5488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:22.649927 sshd[5488]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:22.655083 systemd[1]: Started session-13.scope. May 17 00:37:22.656527 systemd-logind[1425]: New session 13 of user core. May 17 00:37:22.665746 kernel: audit: type=1101 audit(1747442242.630:1458): pid=5488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:22.665827 kernel: audit: type=1103 audit(1747442242.648:1459): pid=5488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:22.668415 kernel: audit: type=1006 audit(1747442242.649:1460): pid=5488 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 17 00:37:22.649000 audit[5488]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5236a880 a2=3 a3=0 items=0 ppid=1 pid=5488 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:22.649000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:37:22.691418 kernel: audit: type=1300 audit(1747442242.649:1460): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5236a880 a2=3 a3=0 items=0 ppid=1 pid=5488 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:22.691472 kernel: audit: type=1327 audit(1747442242.649:1460): proctitle=737368643A20636F7265205B707269765D May 17 00:37:22.661000 audit[5488]: USER_START pid=5488 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:22.697450 kernel: audit: type=1105 audit(1747442242.661:1461): pid=5488 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:22.663000 audit[5490]: CRED_ACQ pid=5490 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:22.714420 kernel: audit: type=1103 audit(1747442242.663:1462): pid=5490 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:23.136457 sshd[5488]: pam_unix(sshd:session): session closed for user core May 17 00:37:23.137000 audit[5488]: USER_END pid=5488 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:23.139520 systemd[1]: sshd@10-10.200.4.40:22-10.200.16.10:41080.service: Deactivated successfully. May 17 00:37:23.140350 systemd[1]: session-13.scope: Deactivated successfully. May 17 00:37:23.141836 systemd-logind[1425]: Session 13 logged out. Waiting for processes to exit. May 17 00:37:23.142757 systemd-logind[1425]: Removed session 13. May 17 00:37:23.137000 audit[5488]: CRED_DISP pid=5488 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:23.156408 kernel: audit: type=1106 audit(1747442243.137:1463): pid=5488 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:23.156454 kernel: audit: type=1104 audit(1747442243.137:1464): pid=5488 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:23.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.4.40:22-10.200.16.10:41080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:23.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.4.40:22-10.200.16.10:41086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:23.241009 systemd[1]: Started sshd@11-10.200.4.40:22-10.200.16.10:41086.service. May 17 00:37:23.826000 audit[5503]: USER_ACCT pid=5503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:23.827315 sshd[5503]: Accepted publickey for core from 10.200.16.10 port 41086 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:37:23.828000 audit[5503]: CRED_ACQ pid=5503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:23.828000 audit[5503]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5041f320 a2=3 a3=0 items=0 ppid=1 pid=5503 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:23.828000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:37:23.829041 sshd[5503]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:23.834248 systemd[1]: Started session-14.scope. May 17 00:37:23.834716 systemd-logind[1425]: New session 14 of user core. May 17 00:37:23.838000 audit[5503]: USER_START pid=5503 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:23.840000 audit[5505]: CRED_ACQ pid=5505 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:24.339685 sshd[5503]: pam_unix(sshd:session): session closed for user core May 17 00:37:24.341000 audit[5503]: USER_END pid=5503 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:24.341000 audit[5503]: CRED_DISP pid=5503 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:24.343162 systemd[1]: sshd@11-10.200.4.40:22-10.200.16.10:41086.service: Deactivated successfully. May 17 00:37:24.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.4.40:22-10.200.16.10:41086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:24.344372 systemd[1]: session-14.scope: Deactivated successfully. May 17 00:37:24.345029 systemd-logind[1425]: Session 14 logged out. Waiting for processes to exit. May 17 00:37:24.345820 systemd-logind[1425]: Removed session 14. May 17 00:37:24.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.4.40:22-10.200.16.10:41092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:24.439182 systemd[1]: Started sshd@12-10.200.4.40:22-10.200.16.10:41092.service. May 17 00:37:25.028000 audit[5513]: USER_ACCT pid=5513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:25.028839 sshd[5513]: Accepted publickey for core from 10.200.16.10 port 41092 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:37:25.029000 audit[5513]: CRED_ACQ pid=5513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:25.029000 audit[5513]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc75f77fe0 a2=3 a3=0 items=0 ppid=1 pid=5513 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:25.029000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:37:25.030359 sshd[5513]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:25.035248 systemd[1]: Started session-15.scope. May 17 00:37:25.035485 systemd-logind[1425]: New session 15 of user core. May 17 00:37:25.040000 audit[5513]: USER_START pid=5513 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:25.041000 audit[5515]: CRED_ACQ pid=5515 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:25.514729 sshd[5513]: pam_unix(sshd:session): session closed for user core May 17 00:37:25.515000 audit[5513]: USER_END pid=5513 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:25.515000 audit[5513]: CRED_DISP pid=5513 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:25.517809 systemd[1]: sshd@12-10.200.4.40:22-10.200.16.10:41092.service: Deactivated successfully. May 17 00:37:25.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.4.40:22-10.200.16.10:41092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:25.519012 systemd[1]: session-15.scope: Deactivated successfully. May 17 00:37:25.519993 systemd-logind[1425]: Session 15 logged out. Waiting for processes to exit. May 17 00:37:25.520977 systemd-logind[1425]: Removed session 15. May 17 00:37:26.973154 kubelet[2423]: E0517 00:37:26.973106 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-ktd8c" podUID="90fc490d-b68e-41e0-a777-9015e6ba2a3c" May 17 00:37:27.200307 systemd[1]: run-containerd-runc-k8s.io-2bbbf50bb8c3bd88e77ea36cc9196c673ace3e9922b22d9b12e7c2e3c0f9e4a7-runc.pX2c4j.mount: Deactivated successfully. May 17 00:37:30.625004 kernel: kauditd_printk_skb: 23 callbacks suppressed May 17 00:37:30.625119 kernel: audit: type=1130 audit(1747442250.613:1484): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.4.40:22-10.200.16.10:40764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:30.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.4.40:22-10.200.16.10:40764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:30.613554 systemd[1]: Started sshd@13-10.200.4.40:22-10.200.16.10:40764.service. May 17 00:37:31.198000 audit[5564]: USER_ACCT pid=5564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:31.198852 sshd[5564]: Accepted publickey for core from 10.200.16.10 port 40764 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:37:31.215000 audit[5564]: CRED_ACQ pid=5564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:31.216654 sshd[5564]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:31.221884 systemd[1]: Started session-16.scope. May 17 00:37:31.223063 systemd-logind[1425]: New session 16 of user core. May 17 00:37:31.232494 kernel: audit: type=1101 audit(1747442251.198:1485): pid=5564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:31.232581 kernel: audit: type=1103 audit(1747442251.215:1486): pid=5564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:31.233411 kernel: audit: type=1006 audit(1747442251.215:1487): pid=5564 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 17 00:37:31.242547 kernel: audit: type=1300 audit(1747442251.215:1487): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff938ccf70 a2=3 a3=0 items=0 ppid=1 pid=5564 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:31.215000 audit[5564]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff938ccf70 a2=3 a3=0 items=0 ppid=1 pid=5564 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:31.215000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:37:31.258417 kernel: audit: type=1327 audit(1747442251.215:1487): proctitle=737368643A20636F7265205B707269765D May 17 00:37:31.228000 audit[5564]: USER_START pid=5564 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:31.280293 kernel: audit: type=1105 audit(1747442251.228:1488): pid=5564 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:31.280364 kernel: audit: type=1103 audit(1747442251.230:1489): pid=5566 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:31.230000 audit[5566]: CRED_ACQ pid=5566 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:31.687004 sshd[5564]: pam_unix(sshd:session): session closed for user core May 17 00:37:31.688000 audit[5564]: USER_END pid=5564 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:31.693010 systemd[1]: sshd@13-10.200.4.40:22-10.200.16.10:40764.service: Deactivated successfully. May 17 00:37:31.693854 systemd[1]: session-16.scope: Deactivated successfully. May 17 00:37:31.696340 systemd-logind[1425]: Session 16 logged out. Waiting for processes to exit. May 17 00:37:31.697277 systemd-logind[1425]: Removed session 16. May 17 00:37:31.689000 audit[5564]: CRED_DISP pid=5564 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:31.722794 kernel: audit: type=1106 audit(1747442251.688:1490): pid=5564 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:31.722890 kernel: audit: type=1104 audit(1747442251.689:1491): pid=5564 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:31.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.4.40:22-10.200.16.10:40764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:31.974801 kubelet[2423]: E0517 00:37:31.974742 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6564c697ff-q65rf" podUID="403007e9-af7a-4a5d-9b90-5920611d9175" May 17 00:37:36.789175 systemd[1]: Started sshd@14-10.200.4.40:22-10.200.16.10:40778.service. May 17 00:37:36.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.4.40:22-10.200.16.10:40778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:36.794527 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:37:36.794598 kernel: audit: type=1130 audit(1747442256.789:1493): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.4.40:22-10.200.16.10:40778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:37.384000 audit[5583]: USER_ACCT pid=5583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:37.384875 sshd[5583]: Accepted publickey for core from 10.200.16.10 port 40778 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:37:37.403000 audit[5583]: CRED_ACQ pid=5583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:37.404694 sshd[5583]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:37.410067 systemd[1]: Started session-17.scope. May 17 00:37:37.411059 systemd-logind[1425]: New session 17 of user core. May 17 00:37:37.421063 kernel: audit: type=1101 audit(1747442257.384:1494): pid=5583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:37.421160 kernel: audit: type=1103 audit(1747442257.403:1495): pid=5583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:37.421190 kernel: audit: type=1006 audit(1747442257.403:1496): pid=5583 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 17 00:37:37.403000 audit[5583]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe00563b0 a2=3 a3=0 items=0 ppid=1 pid=5583 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:37.430406 kernel: audit: type=1300 audit(1747442257.403:1496): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe00563b0 a2=3 a3=0 items=0 ppid=1 pid=5583 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:37.403000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:37:37.453014 kernel: audit: type=1327 audit(1747442257.403:1496): proctitle=737368643A20636F7265205B707269765D May 17 00:37:37.453100 kernel: audit: type=1105 audit(1747442257.416:1497): pid=5583 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:37.416000 audit[5583]: USER_START pid=5583 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:37.470170 kernel: audit: type=1103 audit(1747442257.418:1498): pid=5585 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:37.418000 audit[5585]: CRED_ACQ pid=5585 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:37.939049 sshd[5583]: pam_unix(sshd:session): session closed for user core May 17 00:37:37.941000 audit[5583]: USER_END pid=5583 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:37.961420 kernel: audit: type=1106 audit(1747442257.941:1499): pid=5583 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:37.961615 systemd[1]: sshd@14-10.200.4.40:22-10.200.16.10:40778.service: Deactivated successfully. May 17 00:37:37.962714 systemd[1]: session-17.scope: Deactivated successfully. May 17 00:37:37.963457 systemd-logind[1425]: Session 17 logged out. Waiting for processes to exit. May 17 00:37:37.944000 audit[5583]: CRED_DISP pid=5583 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:37.975932 systemd-logind[1425]: Removed session 17. May 17 00:37:37.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.4.40:22-10.200.16.10:40778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:37.979414 kernel: audit: type=1104 audit(1747442257.944:1500): pid=5583 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:39.974836 env[1435]: time="2025-05-17T00:37:39.974787500Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:37:40.169046 env[1435]: time="2025-05-17T00:37:40.168963943Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:37:40.173452 env[1435]: time="2025-05-17T00:37:40.173381849Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:37:40.173705 kubelet[2423]: E0517 00:37:40.173661 2423 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:37:40.174071 kubelet[2423]: E0517 00:37:40.173723 2423 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:37:40.174071 kubelet[2423]: E0517 00:37:40.173900 2423 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-nl5jn,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-ktd8c_calico-system(90fc490d-b68e-41e0-a777-9015e6ba2a3c): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:37:40.175461 kubelet[2423]: E0517 00:37:40.175420 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-ktd8c" podUID="90fc490d-b68e-41e0-a777-9015e6ba2a3c" May 17 00:37:41.333057 systemd[1]: run-containerd-runc-k8s.io-2c17f355c1d42e08a0b7154544a8c6b9372d0fdc8628bfaec097d6fe2cbbdf8b-runc.l4UCOJ.mount: Deactivated successfully. May 17 00:37:43.039652 systemd[1]: Started sshd@15-10.200.4.40:22-10.200.16.10:32936.service. May 17 00:37:43.065466 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:37:43.065607 kernel: audit: type=1130 audit(1747442263.045:1502): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.4.40:22-10.200.16.10:32936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:43.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.4.40:22-10.200.16.10:32936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:43.674410 kernel: audit: type=1101 audit(1747442263.656:1503): pid=5614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:43.656000 audit[5614]: USER_ACCT pid=5614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:43.674668 sshd[5614]: Accepted publickey for core from 10.200.16.10 port 32936 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:37:43.674526 sshd[5614]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:43.657000 audit[5614]: CRED_ACQ pid=5614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:43.679930 systemd[1]: Started session-18.scope. May 17 00:37:43.681038 systemd-logind[1425]: New session 18 of user core. May 17 00:37:43.691420 kernel: audit: type=1103 audit(1747442263.657:1504): pid=5614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:43.691486 kernel: audit: type=1006 audit(1747442263.657:1505): pid=5614 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 17 00:37:43.657000 audit[5614]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc81c08850 a2=3 a3=0 items=0 ppid=1 pid=5614 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:43.701409 kernel: audit: type=1300 audit(1747442263.657:1505): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc81c08850 a2=3 a3=0 items=0 ppid=1 pid=5614 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:43.657000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:37:43.722199 kernel: audit: type=1327 audit(1747442263.657:1505): proctitle=737368643A20636F7265205B707269765D May 17 00:37:43.685000 audit[5614]: USER_START pid=5614 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:43.687000 audit[5616]: CRED_ACQ pid=5616 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:43.754591 kernel: audit: type=1105 audit(1747442263.685:1506): pid=5614 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:43.754704 kernel: audit: type=1103 audit(1747442263.687:1507): pid=5616 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:44.134541 sshd[5614]: pam_unix(sshd:session): session closed for user core May 17 00:37:44.135000 audit[5614]: USER_END pid=5614 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:44.137655 systemd-logind[1425]: Session 18 logged out. Waiting for processes to exit. May 17 00:37:44.139048 systemd[1]: sshd@15-10.200.4.40:22-10.200.16.10:32936.service: Deactivated successfully. May 17 00:37:44.139875 systemd[1]: session-18.scope: Deactivated successfully. May 17 00:37:44.141446 systemd-logind[1425]: Removed session 18. May 17 00:37:44.153508 kernel: audit: type=1106 audit(1747442264.135:1508): pid=5614 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:44.135000 audit[5614]: CRED_DISP pid=5614 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:44.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.4.40:22-10.200.16.10:32936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:44.170424 kernel: audit: type=1104 audit(1747442264.135:1509): pid=5614 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:46.973783 kubelet[2423]: E0517 00:37:46.973665 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6564c697ff-q65rf" podUID="403007e9-af7a-4a5d-9b90-5920611d9175" May 17 00:37:49.233509 systemd[1]: Started sshd@16-10.200.4.40:22-10.200.16.10:49470.service. May 17 00:37:49.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.4.40:22-10.200.16.10:49470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:49.240191 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:37:49.240276 kernel: audit: type=1130 audit(1747442269.233:1511): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.4.40:22-10.200.16.10:49470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:49.823000 audit[5626]: USER_ACCT pid=5626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:49.825765 sshd[5626]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:49.843678 kernel: audit: type=1101 audit(1747442269.823:1512): pid=5626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:49.843716 kernel: audit: type=1103 audit(1747442269.824:1513): pid=5626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:49.824000 audit[5626]: CRED_ACQ pid=5626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:49.843804 sshd[5626]: Accepted publickey for core from 10.200.16.10 port 49470 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:37:49.850639 systemd[1]: Started session-19.scope. May 17 00:37:49.851788 systemd-logind[1425]: New session 19 of user core. May 17 00:37:49.870054 kernel: audit: type=1006 audit(1747442269.825:1514): pid=5626 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 May 17 00:37:49.870277 kernel: audit: type=1300 audit(1747442269.825:1514): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffceef1520 a2=3 a3=0 items=0 ppid=1 pid=5626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:49.825000 audit[5626]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffceef1520 a2=3 a3=0 items=0 ppid=1 pid=5626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:49.825000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:37:49.892167 kernel: audit: type=1327 audit(1747442269.825:1514): proctitle=737368643A20636F7265205B707269765D May 17 00:37:49.892227 kernel: audit: type=1105 audit(1747442269.856:1515): pid=5626 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:49.856000 audit[5626]: USER_START pid=5626 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:49.909826 kernel: audit: type=1103 audit(1747442269.859:1516): pid=5628 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:49.859000 audit[5628]: CRED_ACQ pid=5628 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:50.311876 sshd[5626]: pam_unix(sshd:session): session closed for user core May 17 00:37:50.313000 audit[5626]: USER_END pid=5626 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:50.315810 systemd-logind[1425]: Session 19 logged out. Waiting for processes to exit. May 17 00:37:50.317341 systemd[1]: sshd@16-10.200.4.40:22-10.200.16.10:49470.service: Deactivated successfully. May 17 00:37:50.318281 systemd[1]: session-19.scope: Deactivated successfully. May 17 00:37:50.319920 systemd-logind[1425]: Removed session 19. May 17 00:37:50.313000 audit[5626]: CRED_DISP pid=5626 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:50.346300 kernel: audit: type=1106 audit(1747442270.313:1517): pid=5626 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:50.346377 kernel: audit: type=1104 audit(1747442270.313:1518): pid=5626 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:50.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.4.40:22-10.200.16.10:49470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:50.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.4.40:22-10.200.16.10:49482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:50.411143 systemd[1]: Started sshd@17-10.200.4.40:22-10.200.16.10:49482.service. May 17 00:37:50.993000 audit[5638]: USER_ACCT pid=5638 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:50.994217 sshd[5638]: Accepted publickey for core from 10.200.16.10 port 49482 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:37:50.994000 audit[5638]: CRED_ACQ pid=5638 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:50.995000 audit[5638]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec52ee360 a2=3 a3=0 items=0 ppid=1 pid=5638 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:50.995000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:37:50.995852 sshd[5638]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:51.000328 systemd-logind[1425]: New session 20 of user core. May 17 00:37:51.000958 systemd[1]: Started session-20.scope. May 17 00:37:51.005000 audit[5638]: USER_START pid=5638 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:51.007000 audit[5642]: CRED_ACQ pid=5642 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:51.585603 sshd[5638]: pam_unix(sshd:session): session closed for user core May 17 00:37:51.586000 audit[5638]: USER_END pid=5638 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:51.586000 audit[5638]: CRED_DISP pid=5638 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:51.588686 systemd[1]: sshd@17-10.200.4.40:22-10.200.16.10:49482.service: Deactivated successfully. May 17 00:37:51.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.4.40:22-10.200.16.10:49482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:51.590083 systemd[1]: session-20.scope: Deactivated successfully. May 17 00:37:51.590098 systemd-logind[1425]: Session 20 logged out. Waiting for processes to exit. May 17 00:37:51.591202 systemd-logind[1425]: Removed session 20. May 17 00:37:51.685335 systemd[1]: Started sshd@18-10.200.4.40:22-10.200.16.10:49486.service. May 17 00:37:51.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.4.40:22-10.200.16.10:49486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:51.972681 kubelet[2423]: E0517 00:37:51.972618 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-ktd8c" podUID="90fc490d-b68e-41e0-a777-9015e6ba2a3c" May 17 00:37:52.269000 audit[5649]: USER_ACCT pid=5649 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:52.270425 sshd[5649]: Accepted publickey for core from 10.200.16.10 port 49486 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:37:52.271000 audit[5649]: CRED_ACQ pid=5649 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:52.271000 audit[5649]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce8f3f510 a2=3 a3=0 items=0 ppid=1 pid=5649 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:52.271000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:37:52.271919 sshd[5649]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:52.276817 systemd[1]: Started session-21.scope. May 17 00:37:52.277257 systemd-logind[1425]: New session 21 of user core. May 17 00:37:52.281000 audit[5649]: USER_START pid=5649 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:52.282000 audit[5651]: CRED_ACQ pid=5651 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:53.467000 audit[5661]: NETFILTER_CFG table=filter:133 family=2 entries=24 op=nft_register_rule pid=5661 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:53.467000 audit[5661]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffc919384b0 a2=0 a3=7ffc9193849c items=0 ppid=2559 pid=5661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.467000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:53.470000 audit[5661]: NETFILTER_CFG table=nat:134 family=2 entries=22 op=nft_register_rule pid=5661 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:53.470000 audit[5661]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc919384b0 a2=0 a3=0 items=0 ppid=2559 pid=5661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.470000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:53.498000 audit[5663]: NETFILTER_CFG table=filter:135 family=2 entries=36 op=nft_register_rule pid=5663 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:53.498000 audit[5663]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffd314ee610 a2=0 a3=7ffd314ee5fc items=0 ppid=2559 pid=5663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.498000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:53.500000 audit[5663]: NETFILTER_CFG table=nat:136 family=2 entries=22 op=nft_register_rule pid=5663 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:53.500000 audit[5663]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd314ee610 a2=0 a3=0 items=0 ppid=2559 pid=5663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.500000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:53.582553 sshd[5649]: pam_unix(sshd:session): session closed for user core May 17 00:37:53.584000 audit[5649]: USER_END pid=5649 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:53.584000 audit[5649]: CRED_DISP pid=5649 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:53.586337 systemd[1]: sshd@18-10.200.4.40:22-10.200.16.10:49486.service: Deactivated successfully. May 17 00:37:53.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.4.40:22-10.200.16.10:49486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:53.587454 systemd[1]: session-21.scope: Deactivated successfully. May 17 00:37:53.588222 systemd-logind[1425]: Session 21 logged out. Waiting for processes to exit. May 17 00:37:53.589086 systemd-logind[1425]: Removed session 21. May 17 00:37:53.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.4.40:22-10.200.16.10:49488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:53.681322 systemd[1]: Started sshd@19-10.200.4.40:22-10.200.16.10:49488.service. May 17 00:37:54.274577 kernel: kauditd_printk_skb: 36 callbacks suppressed May 17 00:37:54.289160 kernel: audit: type=1101 audit(1747442274.267:1543): pid=5666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:54.267000 audit[5666]: USER_ACCT pid=5666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:54.289928 kernel: audit: type=1103 audit(1747442274.269:1544): pid=5666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:54.269000 audit[5666]: CRED_ACQ pid=5666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:54.290067 sshd[5666]: Accepted publickey for core from 10.200.16.10 port 49488 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:37:54.269932 sshd[5666]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:54.281628 systemd[1]: Started session-22.scope. May 17 00:37:54.282438 systemd-logind[1425]: New session 22 of user core. May 17 00:37:54.314050 kernel: audit: type=1006 audit(1747442274.269:1545): pid=5666 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 17 00:37:54.314138 kernel: audit: type=1300 audit(1747442274.269:1545): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef7f0dba0 a2=3 a3=0 items=0 ppid=1 pid=5666 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.269000 audit[5666]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef7f0dba0 a2=3 a3=0 items=0 ppid=1 pid=5666 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.269000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:37:54.290000 audit[5666]: USER_START pid=5666 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:54.352807 kernel: audit: type=1327 audit(1747442274.269:1545): proctitle=737368643A20636F7265205B707269765D May 17 00:37:54.352885 kernel: audit: type=1105 audit(1747442274.290:1546): pid=5666 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:54.352917 kernel: audit: type=1103 audit(1747442274.295:1547): pid=5668 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:54.295000 audit[5668]: CRED_ACQ pid=5668 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:54.880066 sshd[5666]: pam_unix(sshd:session): session closed for user core May 17 00:37:54.881000 audit[5666]: USER_END pid=5666 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:54.883806 systemd[1]: sshd@19-10.200.4.40:22-10.200.16.10:49488.service: Deactivated successfully. May 17 00:37:54.884646 systemd[1]: session-22.scope: Deactivated successfully. May 17 00:37:54.885980 systemd-logind[1425]: Session 22 logged out. Waiting for processes to exit. May 17 00:37:54.886995 systemd-logind[1425]: Removed session 22. May 17 00:37:54.881000 audit[5666]: CRED_DISP pid=5666 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:54.914528 kernel: audit: type=1106 audit(1747442274.881:1548): pid=5666 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:54.914638 kernel: audit: type=1104 audit(1747442274.881:1549): pid=5666 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:54.914672 kernel: audit: type=1131 audit(1747442274.883:1550): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.4.40:22-10.200.16.10:49488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:54.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.4.40:22-10.200.16.10:49488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:54.979364 systemd[1]: Started sshd@20-10.200.4.40:22-10.200.16.10:49500.service. May 17 00:37:54.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.4.40:22-10.200.16.10:49500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:55.566000 audit[5677]: USER_ACCT pid=5677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:55.567374 sshd[5677]: Accepted publickey for core from 10.200.16.10 port 49500 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:37:55.568000 audit[5677]: CRED_ACQ pid=5677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:55.568000 audit[5677]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9dedca70 a2=3 a3=0 items=0 ppid=1 pid=5677 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:55.568000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:37:55.569121 sshd[5677]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:55.574066 systemd[1]: Started session-23.scope. May 17 00:37:55.574543 systemd-logind[1425]: New session 23 of user core. May 17 00:37:55.578000 audit[5677]: USER_START pid=5677 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:55.580000 audit[5679]: CRED_ACQ pid=5679 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:56.049935 sshd[5677]: pam_unix(sshd:session): session closed for user core May 17 00:37:56.051000 audit[5677]: USER_END pid=5677 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:56.051000 audit[5677]: CRED_DISP pid=5677 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:37:56.053554 systemd[1]: sshd@20-10.200.4.40:22-10.200.16.10:49500.service: Deactivated successfully. May 17 00:37:56.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.4.40:22-10.200.16.10:49500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:56.054684 systemd[1]: session-23.scope: Deactivated successfully. May 17 00:37:56.055520 systemd-logind[1425]: Session 23 logged out. Waiting for processes to exit. May 17 00:37:56.056384 systemd-logind[1425]: Removed session 23. May 17 00:37:57.202146 systemd[1]: run-containerd-runc-k8s.io-2bbbf50bb8c3bd88e77ea36cc9196c673ace3e9922b22d9b12e7c2e3c0f9e4a7-runc.xhZSjy.mount: Deactivated successfully. May 17 00:37:57.973806 kubelet[2423]: E0517 00:37:57.973753 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6564c697ff-q65rf" podUID="403007e9-af7a-4a5d-9b90-5920611d9175" May 17 00:37:59.682000 audit[5711]: NETFILTER_CFG table=filter:137 family=2 entries=24 op=nft_register_rule pid=5711 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:59.686520 kernel: kauditd_printk_skb: 11 callbacks suppressed May 17 00:37:59.686641 kernel: audit: type=1325 audit(1747442279.682:1560): table=filter:137 family=2 entries=24 op=nft_register_rule pid=5711 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:59.682000 audit[5711]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffdb6bf7880 a2=0 a3=7ffdb6bf786c items=0 ppid=2559 pid=5711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.717603 kernel: audit: type=1300 audit(1747442279.682:1560): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffdb6bf7880 a2=0 a3=7ffdb6bf786c items=0 ppid=2559 pid=5711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.682000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:59.727161 kernel: audit: type=1327 audit(1747442279.682:1560): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:59.727253 kernel: audit: type=1325 audit(1747442279.717:1561): table=nat:138 family=2 entries=106 op=nft_register_chain pid=5711 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:59.717000 audit[5711]: NETFILTER_CFG table=nat:138 family=2 entries=106 op=nft_register_chain pid=5711 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:59.717000 audit[5711]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdb6bf7880 a2=0 a3=7ffdb6bf786c items=0 ppid=2559 pid=5711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.755466 kernel: audit: type=1300 audit(1747442279.717:1561): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdb6bf7880 a2=0 a3=7ffdb6bf786c items=0 ppid=2559 pid=5711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:59.717000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:59.764585 kernel: audit: type=1327 audit(1747442279.717:1561): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:01.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.4.40:22-10.200.16.10:51068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:01.163028 systemd[1]: Started sshd@21-10.200.4.40:22-10.200.16.10:51068.service. May 17 00:38:01.179418 kernel: audit: type=1130 audit(1747442281.162:1562): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.4.40:22-10.200.16.10:51068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:01.752000 audit[5713]: USER_ACCT pid=5713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:01.753442 sshd[5713]: Accepted publickey for core from 10.200.16.10 port 51068 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:38:01.772414 kernel: audit: type=1101 audit(1747442281.752:1563): pid=5713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:01.773573 sshd[5713]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:38:01.772000 audit[5713]: CRED_ACQ pid=5713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:01.799420 kernel: audit: type=1103 audit(1747442281.772:1564): pid=5713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:01.799460 systemd[1]: Started session-24.scope. May 17 00:38:01.799911 systemd-logind[1425]: New session 24 of user core. May 17 00:38:01.812581 kernel: audit: type=1006 audit(1747442281.772:1565): pid=5713 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 17 00:38:01.772000 audit[5713]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7b033e80 a2=3 a3=0 items=0 ppid=1 pid=5713 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:01.772000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:38:01.811000 audit[5713]: USER_START pid=5713 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:01.813000 audit[5715]: CRED_ACQ pid=5715 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:02.281879 sshd[5713]: pam_unix(sshd:session): session closed for user core May 17 00:38:02.283000 audit[5713]: USER_END pid=5713 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:02.283000 audit[5713]: CRED_DISP pid=5713 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:02.285989 systemd[1]: sshd@21-10.200.4.40:22-10.200.16.10:51068.service: Deactivated successfully. May 17 00:38:02.287033 systemd[1]: session-24.scope: Deactivated successfully. May 17 00:38:02.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.4.40:22-10.200.16.10:51068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:02.288738 systemd-logind[1425]: Session 24 logged out. Waiting for processes to exit. May 17 00:38:02.289718 systemd-logind[1425]: Removed session 24. May 17 00:38:02.972471 kubelet[2423]: E0517 00:38:02.972420 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-ktd8c" podUID="90fc490d-b68e-41e0-a777-9015e6ba2a3c" May 17 00:38:04.850000 audit[4728]: AVC avc: denied { watch } for pid=4728 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_35_46.4159674763/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c286,c954 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c286,c954 tclass=file permissive=0 May 17 00:38:04.856260 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:38:04.856359 kernel: audit: type=1400 audit(1747442284.850:1571): avc: denied { watch } for pid=4728 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_35_46.4159674763/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c286,c954 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c286,c954 tclass=file permissive=0 May 17 00:38:04.879425 kernel: audit: type=1300 audit(1747442284.850:1571): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f5b060 a2=fc6 a3=0 items=0 ppid=3997 pid=4728 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c286,c954 key=(null) May 17 00:38:04.850000 audit[4728]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f5b060 a2=fc6 a3=0 items=0 ppid=3997 pid=4728 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c286,c954 key=(null) May 17 00:38:04.850000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:38:04.910206 kernel: audit: type=1327 audit(1747442284.850:1571): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:38:07.383089 systemd[1]: Started sshd@22-10.200.4.40:22-10.200.16.10:51072.service. May 17 00:38:07.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.4.40:22-10.200.16.10:51072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:07.405105 kernel: audit: type=1130 audit(1747442287.387:1572): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.4.40:22-10.200.16.10:51072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:07.970441 sshd[5726]: Accepted publickey for core from 10.200.16.10 port 51072 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:38:07.972057 sshd[5726]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:38:07.969000 audit[5726]: USER_ACCT pid=5726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:07.979644 systemd[1]: Started session-25.scope. May 17 00:38:07.980434 systemd-logind[1425]: New session 25 of user core. May 17 00:38:07.971000 audit[5726]: CRED_ACQ pid=5726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:08.004609 kernel: audit: type=1101 audit(1747442287.969:1573): pid=5726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:08.004759 kernel: audit: type=1103 audit(1747442287.971:1574): pid=5726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:08.016796 kernel: audit: type=1006 audit(1747442287.971:1575): pid=5726 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 17 00:38:07.971000 audit[5726]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc15c1710 a2=3 a3=0 items=0 ppid=1 pid=5726 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:08.033832 kernel: audit: type=1300 audit(1747442287.971:1575): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc15c1710 a2=3 a3=0 items=0 ppid=1 pid=5726 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:07.971000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:38:08.039715 kernel: audit: type=1327 audit(1747442287.971:1575): proctitle=737368643A20636F7265205B707269765D May 17 00:38:07.990000 audit[5726]: USER_START pid=5726 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:07.992000 audit[5728]: CRED_ACQ pid=5728 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:08.059414 kernel: audit: type=1105 audit(1747442287.990:1576): pid=5726 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:08.454151 sshd[5726]: pam_unix(sshd:session): session closed for user core May 17 00:38:08.455000 audit[5726]: USER_END pid=5726 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:08.455000 audit[5726]: CRED_DISP pid=5726 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:08.457365 systemd[1]: sshd@22-10.200.4.40:22-10.200.16.10:51072.service: Deactivated successfully. May 17 00:38:08.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.4.40:22-10.200.16.10:51072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:08.458414 systemd[1]: session-25.scope: Deactivated successfully. May 17 00:38:08.459102 systemd-logind[1425]: Session 25 logged out. Waiting for processes to exit. May 17 00:38:08.459936 systemd-logind[1425]: Removed session 25. May 17 00:38:09.759000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:09.759000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0026b50a0 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:38:09.759000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:09.774000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:09.774000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011c2480 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:38:09.774000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:09.973219 kubelet[2423]: E0517 00:38:09.973154 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6564c697ff-q65rf" podUID="403007e9-af7a-4a5d-9b90-5920611d9175" May 17 00:38:11.042803 kernel: kauditd_printk_skb: 10 callbacks suppressed May 17 00:38:11.042977 kernel: audit: type=1400 audit(1747442291.019:1583): avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:11.019000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:11.019000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c014fb4480 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:38:11.067528 kernel: audit: type=1300 audit(1747442291.019:1583): arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c014fb4480 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:38:11.019000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:38:11.087485 kernel: audit: type=1327 audit(1747442291.019:1583): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:38:11.042000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=5273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:11.110422 kernel: audit: type=1400 audit(1747442291.042:1584): avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=5273 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:11.042000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c014fb4510 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:38:11.131422 kernel: audit: type=1300 audit(1747442291.042:1584): arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c014fb4510 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:38:11.042000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:38:11.151427 kernel: audit: type=1327 audit(1747442291.042:1584): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:38:11.043000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=5267 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:11.043000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c014fb4870 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:38:11.190611 kernel: audit: type=1400 audit(1747442291.043:1585): avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=5267 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:11.190755 kernel: audit: type=1300 audit(1747442291.043:1585): arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c014fb4870 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:38:11.043000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:38:11.215433 kernel: audit: type=1327 audit(1747442291.043:1585): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:38:11.043000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:11.043000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c006e88080 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:38:11.234620 kernel: audit: type=1400 audit(1747442291.043:1586): avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:11.043000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:38:11.129000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=5271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:11.129000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c014aff200 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:38:11.129000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:38:11.131000 audit[2237]: AVC avc: denied { watch } for pid=2237 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:11.131000 audit[2237]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c012de2700 a2=fc6 a3=0 items=0 ppid=2099 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c211,c537 key=(null) May 17 00:38:11.131000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E342E3430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 17 00:38:11.151000 audit[4867]: AVC avc: denied { watch } for pid=4867 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_35_46.4068466090/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c726,c765 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c726,c765 tclass=file permissive=0 May 17 00:38:11.151000 audit[4867]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0020584c0 a2=fc6 a3=0 items=0 ppid=4631 pid=4867 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c726,c765 key=(null) May 17 00:38:11.151000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:38:11.334490 systemd[1]: run-containerd-runc-k8s.io-2c17f355c1d42e08a0b7154544a8c6b9372d0fdc8628bfaec097d6fe2cbbdf8b-runc.yk7kOJ.mount: Deactivated successfully. May 17 00:38:13.554712 systemd[1]: Started sshd@23-10.200.4.40:22-10.200.16.10:39704.service. May 17 00:38:13.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.4.40:22-10.200.16.10:39704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:14.153000 audit[5758]: USER_ACCT pid=5758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:14.154046 sshd[5758]: Accepted publickey for core from 10.200.16.10 port 39704 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:38:14.155763 sshd[5758]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:38:14.154000 audit[5758]: CRED_ACQ pid=5758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:14.154000 audit[5758]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4f5e2800 a2=3 a3=0 items=0 ppid=1 pid=5758 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:14.154000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:38:14.162503 systemd-logind[1425]: New session 26 of user core. May 17 00:38:14.163118 systemd[1]: Started session-26.scope. May 17 00:38:14.170000 audit[5758]: USER_START pid=5758 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:14.172000 audit[5762]: CRED_ACQ pid=5762 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:14.658913 sshd[5758]: pam_unix(sshd:session): session closed for user core May 17 00:38:14.659000 audit[5758]: USER_END pid=5758 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:14.659000 audit[5758]: CRED_DISP pid=5758 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:14.661879 systemd[1]: sshd@23-10.200.4.40:22-10.200.16.10:39704.service: Deactivated successfully. May 17 00:38:14.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.4.40:22-10.200.16.10:39704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:14.663144 systemd[1]: session-26.scope: Deactivated successfully. May 17 00:38:14.664599 systemd-logind[1425]: Session 26 logged out. Waiting for processes to exit. May 17 00:38:14.666473 systemd-logind[1425]: Removed session 26. May 17 00:38:15.246000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:15.246000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cadaa0 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:38:15.246000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:15.246000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:15.246000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026b5b60 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:38:15.246000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:15.246000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:15.246000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026b5b80 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:38:15.246000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:15.247000 audit[2293]: AVC avc: denied { watch } for pid=2293 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=5265 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:38:15.247000 audit[2293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026b5ba0 a2=fc6 a3=0 items=0 ppid=2136 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c904 key=(null) May 17 00:38:15.247000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:38:16.916482 systemd[1]: run-containerd-runc-k8s.io-2c17f355c1d42e08a0b7154544a8c6b9372d0fdc8628bfaec097d6fe2cbbdf8b-runc.8ZeRqj.mount: Deactivated successfully. May 17 00:38:17.974279 kubelet[2423]: E0517 00:38:17.974228 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-ktd8c" podUID="90fc490d-b68e-41e0-a777-9015e6ba2a3c" May 17 00:38:19.759844 systemd[1]: Started sshd@24-10.200.4.40:22-10.200.16.10:47726.service. May 17 00:38:19.769782 kernel: kauditd_printk_skb: 34 callbacks suppressed May 17 00:38:19.770175 kernel: audit: type=1130 audit(1747442299.760:1603): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.4.40:22-10.200.16.10:47726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:19.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.4.40:22-10.200.16.10:47726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:20.346000 audit[5790]: USER_ACCT pid=5790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:20.349021 sshd[5790]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:38:20.346000 audit[5790]: CRED_ACQ pid=5790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:20.365990 sshd[5790]: Accepted publickey for core from 10.200.16.10 port 47726 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:38:20.366410 kernel: audit: type=1101 audit(1747442300.346:1604): pid=5790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:20.366468 kernel: audit: type=1103 audit(1747442300.346:1605): pid=5790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:20.375119 systemd[1]: Started session-27.scope. May 17 00:38:20.376506 systemd-logind[1425]: New session 27 of user core. May 17 00:38:20.346000 audit[5790]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff33c015d0 a2=3 a3=0 items=0 ppid=1 pid=5790 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:20.418273 kernel: audit: type=1006 audit(1747442300.346:1606): pid=5790 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 17 00:38:20.418413 kernel: audit: type=1300 audit(1747442300.346:1606): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff33c015d0 a2=3 a3=0 items=0 ppid=1 pid=5790 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:20.346000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:38:20.382000 audit[5790]: USER_START pid=5790 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:20.441046 kernel: audit: type=1327 audit(1747442300.346:1606): proctitle=737368643A20636F7265205B707269765D May 17 00:38:20.441122 kernel: audit: type=1105 audit(1747442300.382:1607): pid=5790 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:20.384000 audit[5793]: CRED_ACQ pid=5793 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:20.455673 kernel: audit: type=1103 audit(1747442300.384:1608): pid=5793 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:20.828809 sshd[5790]: pam_unix(sshd:session): session closed for user core May 17 00:38:20.830000 audit[5790]: USER_END pid=5790 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:20.832445 systemd[1]: sshd@24-10.200.4.40:22-10.200.16.10:47726.service: Deactivated successfully. May 17 00:38:20.833248 systemd[1]: session-27.scope: Deactivated successfully. May 17 00:38:20.835052 systemd-logind[1425]: Session 27 logged out. Waiting for processes to exit. May 17 00:38:20.835980 systemd-logind[1425]: Removed session 27. May 17 00:38:20.848931 kernel: audit: type=1106 audit(1747442300.830:1609): pid=5790 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:20.849008 kernel: audit: type=1104 audit(1747442300.830:1610): pid=5790 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:20.830000 audit[5790]: CRED_DISP pid=5790 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:20.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.4.40:22-10.200.16.10:47726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:24.972697 kubelet[2423]: E0517 00:38:24.972639 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6564c697ff-q65rf" podUID="403007e9-af7a-4a5d-9b90-5920611d9175" May 17 00:38:25.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.4.40:22-10.200.16.10:47742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:25.943241 systemd[1]: Started sshd@25-10.200.4.40:22-10.200.16.10:47742.service. May 17 00:38:25.948181 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:38:25.948283 kernel: audit: type=1130 audit(1747442305.943:1612): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.4.40:22-10.200.16.10:47742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:26.527000 audit[5808]: USER_ACCT pid=5808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:26.528182 sshd[5808]: Accepted publickey for core from 10.200.16.10 port 47742 ssh2: RSA SHA256:07CXe8ueQ4fNlYAl4hK7sSS8EcVy/wqg6UxAP3bqsIw May 17 00:38:26.545000 audit[5808]: CRED_ACQ pid=5808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:26.546327 sshd[5808]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:38:26.552280 systemd[1]: Started session-28.scope. May 17 00:38:26.553522 systemd-logind[1425]: New session 28 of user core. May 17 00:38:26.562722 kernel: audit: type=1101 audit(1747442306.527:1613): pid=5808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:26.562802 kernel: audit: type=1103 audit(1747442306.545:1614): pid=5808 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:26.563410 kernel: audit: type=1006 audit(1747442306.545:1615): pid=5808 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 May 17 00:38:26.545000 audit[5808]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa2f762c0 a2=3 a3=0 items=0 ppid=1 pid=5808 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:26.588754 kernel: audit: type=1300 audit(1747442306.545:1615): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa2f762c0 a2=3 a3=0 items=0 ppid=1 pid=5808 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:26.588833 kernel: audit: type=1327 audit(1747442306.545:1615): proctitle=737368643A20636F7265205B707269765D May 17 00:38:26.545000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:38:26.559000 audit[5808]: USER_START pid=5808 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:26.594448 kernel: audit: type=1105 audit(1747442306.559:1616): pid=5808 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:26.611756 kernel: audit: type=1103 audit(1747442306.562:1617): pid=5810 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:26.562000 audit[5810]: CRED_ACQ pid=5810 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:27.021156 sshd[5808]: pam_unix(sshd:session): session closed for user core May 17 00:38:27.022000 audit[5808]: USER_END pid=5808 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:27.024816 systemd[1]: sshd@25-10.200.4.40:22-10.200.16.10:47742.service: Deactivated successfully. May 17 00:38:27.025680 systemd[1]: session-28.scope: Deactivated successfully. May 17 00:38:27.027218 systemd-logind[1425]: Session 28 logged out. Waiting for processes to exit. May 17 00:38:27.028130 systemd-logind[1425]: Removed session 28. May 17 00:38:27.022000 audit[5808]: CRED_DISP pid=5808 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:27.041418 kernel: audit: type=1106 audit(1747442307.022:1618): pid=5808 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:27.041478 kernel: audit: type=1104 audit(1747442307.022:1619): pid=5808 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 17 00:38:27.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.4.40:22-10.200.16.10:47742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:38:28.972812 kubelet[2423]: E0517 00:38:28.972758 2423 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-ktd8c" podUID="90fc490d-b68e-41e0-a777-9015e6ba2a3c"